Sciweavers

489 search results - page 71 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
CSE
2009
IEEE
14 years 5 months ago
A Study of Information Diffusion over a Realistic Social Network Model
—Sociological models of human behavior can explain population-level phenomena within social systems; computer modeling can simulate a wide variety of scenarios and allow one to p...
Andrea Apolloni, Karthik Channakeshava, Lisa Durbe...
PERCOM
2006
ACM
14 years 10 months ago
Localized Sensor Area Coverage with Low Communication Overhead
We propose several localized sensor area coverage protocols, for arbitrary ratio of sensing and transmission radii. Sensors are assumed to be time synchronized, and active sensors...
Antoine Gallais, Jean Carle, David Simplot-Ryl, Iv...
EMSOFT
2007
Springer
14 years 4 months ago
The revenge of the overlay: automatic compaction of OS kernel code via on-demand code loading
There is increasing interest in using general-purpose operating systems, such as Linux, on embedded platforms. It is especially important in embedded systems to use memory effici...
Haifeng He, Saumya K. Debray, Gregory R. Andrews
PG
1999
IEEE
14 years 2 months ago
A Speech Driven Talking Head System Based on a Single Face Image
In this paper, a lifelike talking head system is proposed. The talking head, which is driven by speaker independent speech recognition, requires only one single face image to synt...
I-Chen Lin, Cheng-Sheng Hung, Tzong-Jer Yang, Ming...
ATAL
2006
Springer
14 years 2 months ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...