Sciweavers

1770 search results - page 184 / 354
» Writing requirements in computer security
Sort
View
VTC
2006
IEEE
14 years 4 months ago
Reduced-Complexity Maximum-Likelihood Detection in Downlink SDMA Systems
— The literature of up-link SDMA systems is rich, but at the time of writing there is a paucity of information on the employment of SDMA techniques in the down-link. Hence, in th...
Jos Akhtman, Chun-Yi Wei, Lajos Hanzo
ESCIENCE
2005
IEEE
14 years 4 months ago
Flexible IO Services in the Kepler Grid Workflow System
Existing Grid workflow tools assume that individual components either communicate by passing files from one application to another, or are explicitly linked using interprocess com...
David Abramson, Jagan Kommineni, Ilkay Altintas
ITCC
2005
IEEE
14 years 4 months ago
Disciplined Methods of Software Specification: A Case Study
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...
SIGCOMM
2005
ACM
14 years 4 months ago
OpenDHT: a public DHT service and its uses
Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
ICDAR
2003
IEEE
14 years 4 months ago
Towards Automatic Video-based Whiteboard Reading
As whiteboards have become a popular tool in meeting rooms, there has been a growing interest in making use of the whiteboard as a user interface for human computer interaction. T...
Markus Wienecke, Gernot A. Fink, Gerhard Sagerer