Sciweavers

1472 search results - page 12 / 295
» Technique Integration for Requirements Assessment
Sort
View
PDCAT
2007
Springer
14 years 25 days ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
HUC
2011
Springer
12 years 6 months ago
Towards qualitative assessment of weight lifting exercises using body-worn sensors
Sports exercises are beneficial for general health and fitness. Some exercises such as weight lifting are particularly errorprone and using incorrect techniques can result in seri...
Eduardo Velloso, Andreas Bulling, Hans Gellersen
DGO
2007
174views Education» more  DGO 2007»
13 years 8 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
BMCBI
2006
155views more  BMCBI 2006»
13 years 6 months ago
A powerful method for detecting differentially expressed genes from GeneChip arrays that does not require replicates
Background: Studies of differential expression that use Affymetrix GeneChip arrays are often carried out with a limited number of replicates. Reasons for this include financial co...
Anne-Mette K. Hein, Sylvia Richardson
FORMATS
2010
Springer
13 years 4 months ago
Natural Domain SMT: A Preliminary Assessment
SMT solvers have traditionally been based on the DPLL(T) algorithm, where the driving force behind the procedure is a DPLL search over truth valuations. This traditional framework ...
Scott Cotton