Sciweavers

1472 search results - page 39 / 295
» Technique Integration for Requirements Assessment
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 4 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ICDT
2009
ACM
119views Database» more  ICDT 2009»
14 years 10 months ago
Analysis of sampling techniques for association rule mining
In this paper, we present a comprehensive theoretical analysis of the sampling technique for the association rule mining problem. Most of the previous works have concentrated only...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
DATE
2009
IEEE
244views Hardware» more  DATE 2009»
14 years 4 months ago
Contactless testing: Possibility or pipe-dream?
The traditionally wired interfaces of many electronic systems are in many applications being replaced by wireless interfaces. Testing of electronic systems (both integrated circui...
Erik Jan Marinissen, Dae Young Lee, John P. Hayes,...
AEI
2002
70views more  AEI 2002»
13 years 9 months ago
A performance-based approach to wheelchair accessible route analysis
This paper presents a method to determine if a usable wheelchair accessible route in a facility exists using motion-planning techniques. We use a `performance-based' approach...
Charles S. Han, Kincho H. Law, Jean-Claude Latombe...
NDQA
2003
96views Education» more  NDQA 2003»
13 years 11 months ago
A Technique to Resolve Contradictory Answers
With the ever-increasing amount of textual information available, it is becoming increasingly unlikely that a single document will provide the answer to a question. A more likely ...
Catherine Blake