Sciweavers

2351 search results - page 160 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 4 months ago
ML(n)BiCGStab: Reformulation, Analysis and Implementation
With the help of index functions, we re-derive the ML(n)BiCGStab algorithm in [35] in a more systematic way. There are n ways to define the ML(n)BiCGStab residual vector. Each diff...
Man-Chung Yeung
SSS
2010
Springer
139views Control Systems» more  SSS 2010»
15 years 2 months ago
Vulnerability Analysis of High Dimensional Complex Systems
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective...
Vedant Misra, Dion Harmon, Yaneer Bar-Yam
ISBI
2008
IEEE
16 years 5 months ago
Pediatric cranial defect surface analysis for craniosynostosis postoperation CT images
Craniosynostosis is a congenital disease which consists of premature fusion of one or more cranial sutures, resulting in an abnormal head shape. Patients are usually treated by cr...
Chia-Chi Teng, Linda G. Shapiro, Richard A. Hopper...
ICCD
2004
IEEE
128views Hardware» more  ICCD 2004»
16 years 1 months ago
Static Transition Probability Analysis Under Uncertainty
Deterministic gate delay models have been widely used to find the transition probabilities at the nodes of a circuit for calculating the power dissipation. However, with progress...
Siddharth Garg, Siddharth Tata, Ravishankar Arunac...