Sciweavers

24105 search results - page 4554 / 4821
» Models in Information Retrieval
Sort
View
FEDCSIS
2011
87views more  FEDCSIS 2011»
14 years 3 months ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
HUC
2011
Springer
14 years 3 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
ICC
2011
IEEE
219views Communications» more  ICC 2011»
14 years 3 months ago
Deterministic Equivalents for the Performance Analysis of Isometric Random Precoded Systems
—We consider a general wireless channel model for different types of code-division multiple access (CDMA) and space-division multiple-access (SDMA) systems with isometric random ...
Jakob Hoydis, Romain Couillet, Mérouane Deb...
ICDCS
2011
IEEE
14 years 3 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 11 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
« Prev « First page 4554 / 4821 Last » Next »