Sciweavers

1352 search results - page 222 / 271
» Designing Security Requirements Models Through Planning
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
137
Voted
IUI
2010
ACM
16 years 12 days ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
119
Voted
ICNP
2002
IEEE
15 years 8 months ago
An Investigation of Inter-Domain Control Aggregation Procedures
Current Quality of Service models such as those embodied in the Differentiated Services proposals, rely on data path aggregation to achieve scalability. Data path aggregation bund...
Rute Sofia, Roch Guérin, Pedro Veiga
153
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
136
Voted
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 4 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King