Sciweavers

ICMENS
2005
IEEE
115views Hardware» more  ICMENS 2005»
14 years 2 months ago
LIGA Cavity Resonator for K-Band Applications
A 2-mm deep microwave cavity resonator is proposed for LIGA micro-fabrication. LIGA provides highly vertical and optically smooth sidewalls, leading to potentially high quality (Q...
Zhen Ma, David M. Klymyshyn, Sven Achenbach
ICMENS
2005
IEEE
97views Hardware» more  ICMENS 2005»
14 years 2 months ago
A Parametric Study of Thermal Effects on the Reliability of RF MEMS Switches
The influence of thermal effects on the reliability of RF MEMS switches is investigated in this paper. Low power consumption and capacity to handle high power at very high frequen...
Jonathan Lueke, Noor Al Quddus, Walied A. Moussa, ...
ICMENS
2005
IEEE
115views Hardware» more  ICMENS 2005»
14 years 2 months ago
Pulse-actuated micromechanical resonator using digital Kalman observer
The paper presents a digital oscillating loop for a MEMS resonator in which the instantaneous resonator position is estimated on-line with a Kalman observer. The approach is appli...
Éric Colinet, Dimitri Galayko, Jér&o...
ICECCS
2005
IEEE
125views Hardware» more  ICECCS 2005»
14 years 2 months ago
Model Checking Live Sequence Charts
Live Sequence Charts (LSCs) are a broad extension to Message Sequence Charts (MSCs) to capture complex interobject communication rigorously. A tool support for LSCs, named PlayEng...
Jun Sun 0001, Jin Song Dong
ICECCS
2005
IEEE
91views Hardware» more  ICECCS 2005»
14 years 2 months ago
Extending SOFL Features for AOP Modeling
SOFL is a formal language and method for software system analysis, specification and design and it fully supports structured techniques and object-oriented techniques. AOP (Aspect...
Yao Shen, Haopeng Chen
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
14 years 2 months ago
Modeling Diverse and Complex Interactions Enabled by Middleware as Connectors in Software Architectures
Middleware enables distributed components to interact with each others in diverse and complex manners. Such interactions should be modeled at architecture level for controlling th...
Yali Zhu
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 2 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 2 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 2 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
14 years 2 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco