Sciweavers

17 search results - page 3 / 4
» Ten iterative steps in development and evaluation of environ...
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
ISMB
1994
13 years 9 months ago
An Improved System for Exon Recognition and Gene Modeling in Human DNA Sequence
A new version of the GRAIL system (Uberbacher and Mural, 1991; Mural et al., 1992; Uberbacher et al., 1993), called GRAILII, has recently been developed (Xu et al., 1994). GRAILII...
Yin Xu, J. Ralph Einstein, Richard J. Mural, Manes...
SIGSOFT
2007
ACM
14 years 8 months ago
Program representations for testing wireless sensor network applications
Because of the growing complexity of wireless sensor network applications (WSNs), traditional software development tools are being developed that are specifically designed for the...
Nguyet T. M. Nguyen, Mary Lou Soffa
TSP
2008
126views more  TSP 2008»
13 years 7 months ago
HOS-Based Semi-Blind Spatial Equalization for MIMO Rayleigh Fading Channels
In this paper we concentrate on the direct semi-blind spatial equalizer design for MIMO systems with Rayleigh fading channels. Our aim is to develop an algorithm which can outperf...
Zhiguo Ding, Tharmalingam Ratnarajah, Colin Cowan
SIGIR
2012
ACM
11 years 10 months ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka