Sciweavers

1557 search results - page 291 / 312
» Evolution of Business Processes and a Process Simulation Too...
Sort
View
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
14 years 2 months ago
Learning to Select State Machines using Expert Advice on an Autonomous Robot
— Hierarchical state machines have proven to be a powerful tool for controlling autonomous robots due to their flexibility and modularity. For most real robot implementations, h...
Brenna Argall, Brett Browning, Manuela M. Veloso
MODELS
2007
Springer
14 years 2 months ago
Statechart Development Beyond WYSIWYG
Modeling systems based on semi-formal graphical formalisms, such as Statecharts, have become standard practice in the design of reactive embedded devices. Statecharts are often mor...
Steffen Prochnow, Reinhard von Hanxleden
TELETRAFFIC
2007
Springer
14 years 2 months ago
A Phase-Type Based Markov Chain Model for IEEE 802.16e Sleep Mode and Its Performance Analysis
Abstract. To support battery powered mobile broadband wireless access devices efficiently, IEEE 802.16e defines a sleep mode operation for conserving the power of mobile terminals...
Zhisheng Niu, Yanfeng Zhu, Vilius Benetis
ACSAC
2006
IEEE
14 years 2 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski