Sciweavers

597 search results - page 82 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
TASE
2010
IEEE
13 years 2 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
ICCCN
2007
IEEE
14 years 1 months ago
Bloom Filter Accelerator for String Matching
— In this paper we present a hardware architecture for string matching. Our solution based on using a Bloom filter based pre-processor and a parallelized hashing engine is capab...
M. Nourani, P. Katta
OOPSLA
2007
Springer
14 years 1 months ago
SmartEMF: guidance in modeling tools
The advent of domain-specific modeling in enterprise systems development has given rise to new tool requirements. Existing tools do not offer sufficient modeling guidance or inc...
Anders Hessellund
IBPRIA
2007
Springer
14 years 1 months ago
Real-Time Facial Expression Recognition for Natural Interaction
The recognition of emotional information is a key step toward giving computers the ability to interact more naturally and intelligently with people. This paper presents a completel...
Eva Cerezo, Isabelle Hupont, Cristina Manresa-Yee,...