Sciweavers

2004 search results - page 296 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
AVI
2008
15 years 6 months ago
VCode and VData: illustrating a new framework for supporting the video annotation workflow
Digital tools for annotation of video have the promise to provide immense value to researchers in disciplines ranging from psychology to ethnography to computer science. With trad...
Joey Hagedorn, Joshua M. Hailpern, Karrie Karahali...
RAID
2004
Springer
15 years 9 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
JMM2
2008
107views more  JMM2 2008»
15 years 4 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso
ICC
2009
IEEE
114views Communications» more  ICC 2009»
15 years 2 months ago
Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints
1 Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has perfect channel side information. Being unaware of the...
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar