Sciweavers

183 search results - page 17 / 37
» Safety analysis of usage control authorization models
Sort
View
HASE
1997
IEEE
14 years 25 days ago
Analytical Modelling and Evaluation of Phased-Mission Systems for Space Applications
This paper deals with the modelling and evaluation of mission-phased systems devoted to space applications. We propose a two level hierarchical method that allows to model such sy...
Andrea Bondavalli, Ivan Mura, Manuela Nelli
MSWIM
2009
ACM
14 years 1 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
CN
1998
119views more  CN 1998»
13 years 8 months ago
The Order of Things: Activity-Centred Information Access,
This paper focuses on the representation and access of Web-based information, and how to make such a representation adapt to the activities or interests of individuals within a co...
Matthew Chalmers, Kerry Rodden, Dominique Brodbeck
VR
2007
IEEE
133views Virtual Reality» more  VR 2007»
14 years 2 months ago
VRFire: an Immersive Visualization Experience for Wildfire Spread Analysis
Wildfires are a frequent summer-time concern for land managers and communities neighboring wildlands throughout the world. Computational simulations have been developed to help an...
William R. Sherman, Michael Penick, Simon Su, Timo...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 9 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...