Sciweavers

1429 search results - page 199 / 286
» An Overview of the Annex System
Sort
View
CACM
2010
97views more  CACM 2010»
13 years 7 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao
AUGHUMAN
2011
13 years 5 months ago
Full body interaction for serious games in motor rehabilitation
Serious games and especially their use in healthcare applications are an active and rapidly growing area of research. A key aspect of games in rehabilitation is 3D input. In this ...
Christian Schönauer, Thomas Pintaric, Hannes ...
JCS
2011
87views more  JCS 2011»
13 years 5 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
KBS
2011
116views more  KBS 2011»
13 years 5 months ago
Advanced empirical testing
In today’s industrial applications, we see that knowledge systems are successfully implemented. However, critical domains require the elaborate and thoughtful validation of the ...
Joachim Baumeister

Tutorial
2179views
15 years 10 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel