Sciweavers

3193 search results - page 606 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICTAC
2010
Springer
13 years 6 months ago
Scalable Distributed Concolic Testing: A Case Study on a Flash Storage Platform
Flash memory has become a virtually indispensable component for mobile devices in today’s information society. However, conventional testing methods often fail to detect hidden b...
Yunho Kim, Moonzoo Kim, Nam Dang
JSAC
2010
194views more  JSAC 2010»
13 years 6 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
CDC
2010
IEEE
154views Control Systems» more  CDC 2010»
13 years 2 months ago
Distributed constrained optimization over noisy networks
In this paper we deal with two problems which are of great interest in the field of distributed decision making and control. The first problem we tackle is the problem of achieving...
Kunal Srivastava, Angelia Nedic, Dusan M. Stipanov...
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
13 years 2 months ago
Hybrid moment computation algorithm for biochemical reaction networks
Moment computation is essential to the analysis of stochastic kinetic models of biochemical reaction networks. It is often the case that the moment evolution, usually the first and...
Yun-Bo Zhao, Jongrae Kim, João Pedro Hespan...
BMCBI
2004
228views more  BMCBI 2004»
13 years 7 months ago
An XML standard for the dissemination of annotated 2D gel electrophoresis data complemented with mass spectrometry results
Background: Many proteomics initiatives require a seamless bioinformatics integration of a range of analytical steps between sample collection and systems modeling immediately ass...
Romesh Stanislaus, Liu Hong Jiang, Martha Swartz, ...