Sciweavers

24105 search results - page 4507 / 4821
» Models in Information Retrieval
Sort
View
INFSOF
2007
114views more  INFSOF 2007»
15 years 4 months ago
Managing the business of software product line: An empirical investigation of key business factors
Business has been highlighted as a one of the critical dimensions of software product line engineering. This paper’s main contribution is to increase the understanding of the in...
Faheem Ahmed, Luiz Fernando Capretz
TCOM
2008
108views more  TCOM 2008»
15 years 4 months ago
Performance analysis on an MAP fine timing algorithm in UWB multiband OFDM
In this paper we develop a fine synchronization algorithm for multiband OFDM transmission in the presence of frequency selective channels. This algorithm is based on maximum a post...
Christian R. Berger, Shengli Zhou, Zhi Tian, Peter...
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TIP
2008
152views more  TIP 2008»
15 years 4 months ago
Localizing Region-Based Active Contours
Abstract--In this paper, we propose a natural framework that allows any region-based segmentation energy to be re-formulated in a local way. We consider local rather than global im...
Shawn Lankton, Allen Tannenbaum
TISSEC
2008
202views more  TISSEC 2008»
15 years 4 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
« Prev « First page 4507 / 4821 Last » Next »