Sciweavers

286 search results - page 52 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ECMDAFA
2008
Springer
118views Hardware» more  ECMDAFA 2008»
13 years 8 months ago
A Metamodeling Approach for Reasoning about Requirements
In requirements engineering, there are several approaches for requirements modeling such as goal-oriented, aspect-driven, and system requirements modeling. In practice, companies o...
Arda Goknil, Ivan Kurtev, Klaas van den Berg
CSUR
2000
84views more  CSUR 2000»
13 years 7 months ago
A framework for framework documentation
ks are quite di cult to understand when one rst uses them: the design is very abstract, to factor out commonality the design is incomplete, requiring additional subclasses to creat...
Gregory Butler, Rudolf K. Keller, Hafedh Mili
TIP
1998
103views more  TIP 1998»
13 years 7 months ago
Orientation diffusions
Abstract—Diffusions are useful for image processing and computer vision because they provide a convenient way of smoothing noisy data, analyzing images at multiple scales, and en...
Pietro Perona
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 7 days ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
14 years 1 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han