Sciweavers

641 search results - page 77 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
CSWWS
2006
14 years 1 months ago
Fulfilling the Needs of a Metadata Creator and Analyst- An Investigation of RDF Browsing and Visualization Tools
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Shah Kushro, A. Min Tjoa
IFIP13
2004
13 years 11 months ago
The Role of Night Vision Equipment in Military Incidents and Accidents
Night vision devices provide enormous benefits. They enable personnel to carry out operations under conditions that would not otherwise be possible. However, these benefits carry c...
Chris W. Johnson
BMCBI
2006
146views more  BMCBI 2006»
13 years 9 months ago
A database application for pre-processing, storage and comparison of mass spectra derived from patients and controls
Background: Statistical comparison of peptide profiles in biomarker discovery requires fast, userfriendly software for high throughput data analysis. Important features are flexib...
Mark K. Titulaer, Ivar Siccama, Lennard J. Dekker,...
MOBISYS
2005
ACM
14 years 9 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
ACSAC
2007
IEEE
14 years 1 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon