Sciweavers

1040 search results - page 169 / 208
» Controlling Aspect Reentrancy
Sort
View
CORR
2008
Springer
97views Education» more  CORR 2008»
15 years 4 months ago
Towards a Spreadsheet Engineering
In this paper, we report some on-going focused research, but are further keen to set it in the context of a proposed bigger picture, as follows. There is a certain depressing patt...
V. R. Vemula, David Ball, Simon R. Thorne
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 4 months ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux
CVIU
2008
203views more  CVIU 2008»
15 years 4 months ago
A computer vision model for visual-object-based attention and eye movements
This paper presents a new computational framework for modelling visual-object based attention and attention-driven eye movements within an integrated system in a biologically insp...
Yaoru Sun, Robert B. Fisher, Fang Wang, Herman Mar...
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 4 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
IJNSEC
2006
89views more  IJNSEC 2006»
15 years 4 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara