Sciweavers

581 search results - page 90 / 117
» policy 2009
Sort
View
DATE
2009
IEEE
139views Hardware» more  DATE 2009»
14 years 3 months ago
Reliable mode changes in real-time systems with fixed priority or EDF scheduling
Abstract—Many application domains require adaptive realtime embedded systems that can change their functionality over time. In such systems it is not only necessary to guarantee ...
Nikolay Stoimenov, Simon Perathoner, Lothar Thiele
DSN
2009
IEEE
14 years 3 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...
GLOBECOM
2009
IEEE
14 years 3 months ago
Cognitive Radio Enhancements for Legacy Networks Using Cooperative Diversity
Abstract— Two driving goals for cognitive radio (CR) technique are maximizing spectrum utilization and avoiding interference to primary users. In this paper, we deal with the CR ...
Zhanwei Sun, Ioannis Krikidis, J. Nicholas Laneman...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
WETICE
2009
IEEE
14 years 3 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...