Sciweavers

2835 search results - page 545 / 567
» Imperfect Requirements in Software Development
Sort
View
VRST
2009
ACM
14 years 4 months ago
The virtual magic lantern: an interaction metaphor for enhanced medical data inspection
In Volume Rendering, it is difficult to simultaneously visualize interior and exterior structures. Several approaches have been developed to solve this problem, such as cut-away ...
Eva Monclús, José Díaz, Isabe...
CSFW
2008
IEEE
14 years 4 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 4 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
ICPPW
2008
IEEE
14 years 4 months ago
Energy Modeling of Processors in Wireless Sensor Networks Based on Petri Nets
Power minimization is a serious issue in wireless sensor networks to extend the lifetime and minimize costs. However, in order to gain an accurate understanding of issues regardin...
Ali Shareef, Yifeng Zhu
INFOCOM
2008
IEEE
14 years 4 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng