Sciweavers

1407 search results - page 186 / 282
» Systems Theory Model for Information Security
Sort
View
CIBCB
2006
IEEE
15 years 10 months ago
A Stochastic model to estimate the time taken for Protein-Ligand Docking
Abstract— Quantum mechanics and molecular dynamic simulation provide important insights into structural configurations and molecular interaction data today. To extend this atomi...
Preetam Ghosh, Samik Ghosh, Kalyan Basu, Sajal K. ...
KBSE
2009
IEEE
15 years 11 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
15 years 10 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...
HICSS
2006
IEEE
198views Biometrics» more  HICSS 2006»
15 years 10 months ago
Modeling Initial and Repeat Online Trust in B2C E-Commerce
Prior research has demonstrated that the degrees and impact of customer trust on purchase intentions change with online experience. While online trust research has incorporated an...
Wei-Chang Kong, Yu-Ting Caisy Hung
PAMI
2008
161views more  PAMI 2008»
15 years 3 months ago
Multilayered 3D LiDAR Image Construction Using Spatial Models in a Bayesian Framework
Standard 3D imaging systems process only a single return at each pixel from an assumed single opaque surface. However, there are situations when the laser return consists of multip...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...