Sciweavers

3686 search results - page 225 / 738
» Comprehensive comprehensions
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
VALUETOOLS
2006
ACM
236views Hardware» more  VALUETOOLS 2006»
14 years 3 months ago
The DISCO network calculator: a toolbox for worst case analysis
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in ...
Jens B. Schmitt, Frank A. Zdarsky
ACSC
2005
IEEE
14 years 3 months ago
Integration of generic program analysis tools into a software development environment
Support for program understanding in development and maintenance tasks can be facilitated by program analysis techniques. Both control-flow and data-flow analysis can support pr...
Erica Glynn, Ian J. Hayes, Anthony MacDonald
ANSS
2005
IEEE
14 years 3 months ago
Mobility Modeling of Outdoor Scenarios for MANETs
Mobility of users significantly impacts performance of a mobile ad-hoc network. Most existing simulation tools offer only a few random mobility models, which poorly reflect user m...
Illya Stepanov, Pedro José Marrón, K...
CSB
2005
IEEE
192views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Operon Prediction in Cyanobacteria using Comparative Genomics
In this work, we performed a comprehensive analysis of the genome organization of eight publicly available cyanobacterial genomes and of the extensively studied Escherichia coli K...
Natalia Khuri, Nikhila S. Rao