Sciweavers

2135 search results - page 347 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
WCRE
2003
IEEE
14 years 2 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 2 months ago
A Combination Measurement for Studying Disorientation
The disorientation problem has been known to exist on hypertext and hypermedia systems. Various approaches have also been recommended and implemented in order to eliminate or redu...
Noor F. M. Yatim
HIS
2007
13 years 10 months ago
Genetic Programming meets Model-Driven Development
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...
EUROPKI
2006
Springer
14 years 1 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
BMCBI
2006
202views more  BMCBI 2006»
13 years 9 months ago
Spectral embedding finds meaningful (relevant) structure in image and microarray data
Background: Accurate methods for extraction of meaningful patterns in high dimensional data have become increasingly important with the recent generation of data types containing ...
Brandon W. Higgs, Jennifer W. Weller, Jeffrey L. S...