Sciweavers

886 search results - page 106 / 178
» Generalized Bezout Identity
Sort
View
IH
2007
Springer
14 years 3 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ISBRA
2007
Springer
14 years 3 months ago
Noise-Based Feature Perturbation as a Selection Method for Microarray Data
Abstract. DNA microarrays can monitor the expression levels of thousands of genes simultaneously, providing the opportunity for the identification of genes that are differentiall...
Li Chen, Dmitry B. Goldgof, Lawrence O. Hall, Stev...
PERSUASIVE
2007
Springer
14 years 3 months ago
Fine Tuning the Persuasion in Persuasive Games
Persuasive games are a relatively new phenomenon, and hold promise as effective vehicles for persuasion. As yet, however, there are few set rules guiding how to design persuasive ...
Rilla Khaled, Pippin Barr, James Noble, Ronald Fis...
SGAI
2007
Springer
14 years 3 months ago
Extending Jess to Handle Uncertainty
Computer scientists are often faced with the challenge of having to model the world and its associated uncertainties. One area in particular where modelling uncertainty is importa...
David Corsar, Derek H. Sleeman, Anne McKenzie
CODES
2006
IEEE
14 years 3 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst