Sciweavers

476 search results - page 31 / 96
» A Speculation-based Approach for Performance and Dependabili...
Sort
View
LCN
2006
IEEE
14 years 2 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
GECCO
2008
Springer
163views Optimization» more  GECCO 2008»
13 years 9 months ago
Embedded evolutionary multi-objective optimization for worst case robustness
In Multi-Objective Problems (MOPs) involving uncertainty, each solution might be associated with a cluster of performances in the objective space depending on the possible scenari...
Gideon Avigad, Jürgen Branke
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 28 days ago
A Combination Measurement for Studying Disorientation
The disorientation problem has been known to exist on hypertext and hypermedia systems. Various approaches have also been recommended and implemented in order to eliminate or redu...
Noor F. M. Yatim
AMDO
2008
Springer
13 years 10 months ago
A Comparative Study on Using Zernike Velocity Moments and Hidden Markov Models for Hand Gesture Recognition
Hand-gesture recognition presents a challenging problem for computer vision due to the articulated structure of the human hand and the complexity of the environments in which it is...
Moaath Al-Rajab, David Hogg, Kia Ng