Sciweavers

953 search results - page 134 / 191
» A note on the paper
Sort
View
TSE
1998
152views more  TSE 1998»
13 years 7 months ago
Communication and Organization: An Empirical Study of Discussion in Inspection Meetings
—This paper describes an empirical study that addresses the issue of communication among members of a software development organization. In particular, data was collected concern...
Carolyn B. Seaman, Victor R. Basili
TSMC
2002
134views more  TSMC 2002»
13 years 7 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
MONET
2007
111views more  MONET 2007»
13 years 7 months ago
Resource Discovery in Activity-Based Sensor Networks
— This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level conc...
Doina Bucur, Jakob E. Bardram
PAMI
2007
220views more  PAMI 2007»
13 years 7 months ago
Automatic Age Estimation Based on Facial Aging Patterns
While recognition of most facial variations, such as identity, expression and gender, has been extensively studied, automatic age estimation has rarely been explored. In contrast ...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles