Sciweavers

955 search results - page 145 / 191
» Coordination analysis: a method for deriving use cases from ...
Sort
View
ATMOS
2010
183views Optimization» more  ATMOS 2010»
13 years 6 months ago
The Complexity of Integrating Routing Decisions in Public Transportation Models
To model and solve optimization problems arising in public transportation, data about the passengers is necessary and has to be included in the models in any phase of the planning...
Marie Schmidt, Anita Schöbel
ICASSP
2010
IEEE
13 years 8 months ago
Graph-spectrum-based neural spike features for stereotrodes and tetrodes
Extracellular recording of neural signals records the action potentials (known as spikes) of neurons adjacent to the electrode as well as the noise generated by the overall neural...
Yasser Ghanbari, Panos Papamichalis, Larry Spence
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 26 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
WWW
2005
ACM
14 years 8 months ago
Learning domain ontologies for Web service descriptions: an experiment in bioinformatics
The reasoning tasks that can be performed with semantic web service descriptions depend on the quality of the domain ontologies used to create these descriptions. However, buildin...
Marta Sabou, Chris Wroe, Carole A. Goble, Gilad Mi...
CADE
2011
Springer
12 years 7 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...