Sciweavers

27692 search results - page 210 / 5539
» Where is ...
Sort
View
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
14 years 3 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
14 years 3 months ago
Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence
TCP is known to have poor performance over unreliable wireless links where packet losses due to transmission errors are misinterpreted as indications of network congestion. TCP en...
Chunlei Liu, Raj Jain
INFOCOM
2003
IEEE
14 years 3 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman
IPPS
2003
IEEE
14 years 3 months ago
Master-slave Tasking on Heterogeneous Processors
In this paper, we consider the problem of scheduling independent identical tasks on heterogeneous processors where communication times and processing times are different. We assum...
Pierre-François Dutot
ISWC
2003
IEEE
14 years 3 months ago
Autocalibration Algorithm for Ultrasonic Location Systems
As mobile and wearable technology has evolved, an increasing need for indoor positioning has arisen. In particular, the use of ultrasonics provides a cheap way to fulfil this nee...
Paul Duff, Henk L. Muller