Sciweavers

897 search results - page 115 / 180
» A Methodology for Agent-Oriented Analysis and Design
Sort
View
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 8 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
TOOLS
2000
IEEE
14 years 15 days ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon
ECRTS
2010
IEEE
13 years 8 months ago
The Demand Bound Function Interface of Distributed Sporadic Pipelines of Tasks Scheduled by EDF
—In distributed real-time embedded systems (DRE), it is common to model an application as a set of task chains. Each chain is activated cyclically and must complete before an end...
Nicola Serreli, Giuseppe Lipari, Enrico Bini
BIOCOMP
2010
13 years 6 months ago
A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection from CT Images
- We present a novel hierarchical modular decision engine for lung nodule detection from CT images implemented by Artificial Neural Networks. The proposed Computer Aided Detection ...
Ömer M. Soysal, Jianhua Chen, Steven Bujenovi...
FTEDA
2006
137views more  FTEDA 2006»
13 years 8 months ago
Statistical Performance Modeling and Optimization
As IC technologies scale to finer feature sizes, it becomes increasingly difficult to control the relative process variations. The increasing fluctuations in manufacturing process...
Xin Li, Jiayong Le, Lawrence T. Pileggi