Sciweavers

495 search results - page 82 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 4 months ago
Impact of Sampling Jitter on Mostly-Digital Architectures for UWB Bio-Medical Applications
Abstract— Ultra-wideband (UWB) impulse radio is a promising technique for low-power bio-medical communication systems. While a range of analog and digital UWB architectures exist...
Andrew Fort, Mike Chen, Robert W. Brodersen, Claud...
ATAL
2008
Springer
13 years 11 months ago
Simulating human behaviors in agent societies
As increasing numbers of processors and agents pervade the human environment, societies comprising both humans and agents will emerge. Presently, it is unknown how a person might ...
Alicia Ruvinsky, Michael N. Huhns
OTM
2005
Springer
14 years 3 months ago
Spatio-temporal Schema Integration with Validation: A Practical Approach
We propose to enhance a schema integration process with a validation phase employing logic-based data models. In our methodology, we validate the source schemas against the data mo...
Anastasiya Sotnykova, Nadine Cullot, Christelle Va...
ICIP
2002
IEEE
14 years 11 months ago
DPF - a perceptual distance function for image retrieval
For almost a decade, Content-Based Image Retrieval has been an active research area, yet one fundamental problem remains largely unsolved: how to measure perceptual similarity. To...
Baitao Li Chang, E. Ching-Tung Wu
CIKM
2009
Springer
14 years 4 months ago
Using domain ontology for semantic web usage mining and next page prediction
This paper proposes the integration of semantic information drawn from a web application’s domain knowledge into all phases of the web usage mining process (preprocessing, patte...
Nizar R. Mabroukeh, Christie I. Ezeife