Sciweavers

4636 search results - page 713 / 928
» Modelling and Validation with VipTool
Sort
View
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
14 years 3 months ago
Staffing Software Maintenance and Support Projects
In the past decade outsourcing a software system’s support and maintenance has become relatively common across most organizations. In this paper we consider a few issues governi...
Jai Asundi, Sumit Sarkar
ICRA
2005
IEEE
143views Robotics» more  ICRA 2005»
14 years 3 months ago
Cooperative Multi-Robot Systems A study of Vision-based 3-D Mapping using Information Theory
Building cooperatively 3-D maps of unknown environments is one of the application fields of multi-robot systems. This article addressesthatproblemthroughaprobabilisticapproachbas...
Rui Rocha, Jorge Dias, Adriano Carvalho
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
14 years 3 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan