Sciweavers

410 search results - page 53 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
TII
2008
132views more  TII 2008»
15 years 4 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 10 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 4 months ago
The MIMO Iterative Waterfilling Algorithm
Abstract--This paper considers the noncooperative maximization of mutual information in the vector Gaussian interference channel in a fully distributed fashion via game theory. Thi...
Gesualdo Scutari, Daniel Pérez Palomar, Ser...
SPW
2000
Springer
15 years 8 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
RTCSA
2008
IEEE
15 years 11 months ago
Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour
· Modelling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand the behaviour of WSN under worst-case conditions and to...
Petr Jurcík, Ricardo Severino, Anis Koubaa,...