Sciweavers

996 search results - page 124 / 200
» Enhancing UML Models: A Domain Analysis Approach
Sort
View
170
Voted
TASLP
2010
188views more  TASLP 2010»
15 years 2 months ago
MusicBox: Personalized Music Recommendation Based on Cubic Analysis of Social Tags
—Social tagging is becoming increasingly popular in music information retrieval (MIR). It allows users to tag music items like songs, albums, or artists. Social tags are valuable...
Alexandros Nanopoulos, Dimitrios Rafailidis, Panag...
136
Voted
DATE
2009
IEEE
125views Hardware» more  DATE 2009»
15 years 10 months ago
On linewidth-based yield analysis for nanometer lithography
— Lithographic variability and its impact on printability is a major concern in today’s semiconductor manufacturing process. To address sub-wavelength printability, a number of...
Aswin Sreedhar, Sandip Kundu
151
Voted
TWC
2008
201views more  TWC 2008»
15 years 3 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
155
Voted
JUCS
2000
102views more  JUCS 2000»
15 years 3 months ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
118
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr