Sciweavers

3193 search results - page 542 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
SIMUTOOLS
2008
13 years 11 months ago
Increasing wireless revenue with service differentiation
New technologies such as IEEE 802.16 (Wi-MAX) [2] and IEEE 802.11e (Wi-Fi with QoS) [1] enable differentiated services. In this study we explore the potential for increasing the r...
Siamak Ayani, Jean C. Walrand
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 10 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
ENTCS
2002
139views more  ENTCS 2002»
13 years 10 months ago
Automatic Verification of the IEEE-1394 Root Contention Protocol with KRONOS and PRISM
We report on the automatic verification of timed probabilistic properties of the IEEE 1394 root contention protocol combining two existing tools: the real-time modelchecker Kronos...
Conrado Daws, Marta Z. Kwiatkowska, Gethin Norman
TKDE
1998
184views more  TKDE 1998»
13 years 10 months ago
Supporting Ranked Boolean Similarity Queries in MARS
To address the emerging needs of applications that require access to and retrieval of multimedia objects, we are developing the Multimedia Analysis and Retrieval System (MARS) 29]...
Michael Ortega, Yong Rui, Kaushik Chakrabarti, Kri...
COLING
2010
13 years 5 months ago
Emotion Cause Detection with Linguistic Constructions
This paper proposes a multi-label approach to detect emotion causes. The multi-label model not only detects multi-clause causes, but also captures the long-distance information to...
Ying Chen, Sophia Yat Mei Lee, Shoushan Li, Chu-Re...