Sciweavers

1352 search results - page 222 / 271
» Designing Security Requirements Models Through Planning
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
IUI
2010
ACM
14 years 5 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
ICNP
2002
IEEE
14 years 1 months ago
An Investigation of Inter-Domain Control Aggregation Procedures
Current Quality of Service models such as those embodied in the Differentiated Services proposals, rely on data path aggregation to achieve scalability. Data path aggregation bund...
Rute Sofia, Roch Guérin, Pedro Veiga
MOBIWAC
2006
ACM
14 years 2 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
APBC
2003
123views Bioinformatics» more  APBC 2003»
13 years 10 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King