Sciweavers

229 search results - page 25 / 46
» A Case for Priority
Sort
View
PROFES
2004
Springer
14 years 3 months ago
Requirements Prioritization Challenges in Practice
Requirements prioritization is recognized as an important activity in product development. In this paper, we describe the current state of requirements prioritization practices in ...
Laura Lehtola, Marjo Kauppinen, Sari Kujala
ICDAR
2003
IEEE
14 years 3 months ago
Fast Lexicon-Based Word Recognition in Noisy Index Card Images
This paper describes a complete system for reading typewritten lexicon words in noisy images - in this case museum index cards. The system is conceptually simple, and straightforw...
Simon M. Lucas, Gregory Patoulas, Andy C. Downton
ICRA
1998
IEEE
163views Robotics» more  ICRA 1998»
14 years 2 months ago
A Multi-Loop Robust Navigation Architecture for Mobile Robots
This paper describes a multi-loop, modular navigation architecture for mobile robots whose structure allows the execution of most types of navigation tasks in a highly robust mann...
José Castro, Vítor Santos, M. Isabel...
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 2 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
FC
2010
Springer
188views Cryptology» more  FC 2010»
14 years 1 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach