Sciweavers

3281 search results - page 645 / 657
» An Approach to use Executable Models for Testing
Sort
View
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ECCV
2000
Springer
14 years 9 months ago
Colour by Correlation in a Three-Dimensional Colour Space
We improve the promising Colour by Correlation method for computational colour constancy by modifying it to work in a three dimensional colour space. The previous version of the al...
Kobus Barnard, Lindsay Martin, Brian V. Funt
BMCBI
2008
110views more  BMCBI 2008»
13 years 7 months ago
Methylation Linear Discriminant Analysis (MLDA) for identifying differentially methylated CpG islands
Background: Hypermethylation of promoter CpG islands is strongly correlated to transcriptional gene silencing and epigenetic maintenance of the silenced state. As well as its role...
Wei Dai, Jens M. Teodoridis, Janet Graham, Constan...
CHI
2009
ACM
14 years 8 months ago
Adaptive pointing: implicit gain adaptation for absolute pointing devices
Werner A. K?nig HCI-Group, University of Konstanz Box-D73, Universit?t Konstanz 78457 Konstanz, Germany werner.koenig@uni-konstanz.de Jens Gerken HCI-Group, University of Konstanz ...
Harald Reiterer, Jens Gerken, Stefan Dierdorf, Wer...
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis