Sciweavers

955 search results - page 136 / 191
» Coordination analysis: a method for deriving use cases from ...
Sort
View
ECIS
2004
13 years 9 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
SOICT
2010
13 years 2 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 8 months ago
Capacity Results for Block-Stationary Gaussian Fading Channels with a Peak Power Constraint
Abstract--A peak-power-limited single-antenna block-stationary Gaussian fading channel is studied, where neither the transmitter nor the receiver knows the channel state informatio...
Jun Chen, Venugopal V. Veeravalli
METRICS
2003
IEEE
14 years 1 months ago
Using Prior-Phase Effort Records for Re-estimation During Software Projects
Estimating the effort required for software process activities continues to present difficulties for software engineers, particularly given the uncertainty and subjectivity associ...
Stephen G. MacDonell, Martin J. Shepperd
VCIP
2003
170views Communications» more  VCIP 2003»
13 years 9 months ago
How good are the visual MPEG-7 features?
The study presented in this paper analyses descriptions extracted with MPEG-7-descriptors from visual content from the statistical point of view. Good descriptors should generate ...
Horst Eidenberger