Sciweavers

641 search results - page 64 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
CCS
2006
ACM
14 years 1 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
JSW
2008
130views more  JSW 2008»
13 years 9 months ago
A Constraint-Driven Executable Model of Dynamic System Reconfiguration
Dynamic system reconfiguration techniques are presented that can enable the systematic evolution of software systems due to unanticipated changes in specification or requirements. ...
D'Arcy Walsh, Francis Bordeleau, Bran Selic
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 9 months ago
OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics
By comparing genomes among both closely and distally related species, comparative genomics analysis characterizes structures and functions of different genomes in both conserved a...
Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wan...
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
14 years 1 months ago
Improving the performance of active set based Model Predictive Controls by dataflow methods
Abstract-- Dataflow representations of Digital Signal Processing (DSP) software have been developing since the 1980's. They have proven to be useful in identifying bottlenecks...
Ruirui Gu, Shuvra S. Bhattacharyya, William S. Lev...
WSC
2000
13 years 11 months ago
Applications of business process simulation and lean techniques in British Telecommunications PLC
Business processes are increasingly key to the success of companies in the service industry. It is important that these processes are designed and maintained to deliver the most c...
Simon Dennis, Ben C. King, Martin Hind, Stewart Ro...