Sciweavers

3907 search results - page 604 / 782
» Time, Knowledge, and Choice
Sort
View
VIZSEC
2007
Springer
14 years 4 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
WABI
2007
Springer
139views Bioinformatics» more  WABI 2007»
14 years 4 months ago
Computability of Models for Sequence Assembly
Graph-theoretic models have come to the forefront as some of the most powerful and practical methods for sequence assembly. Simultaneously, the computational hardness of the underl...
Paul Medvedev, Konstantinos Georgiou, Gene Myers, ...
DATE
2006
IEEE
96views Hardware» more  DATE 2006»
14 years 4 months ago
On the relation between simulation-based and SAT-based diagnosis
The problem of diagnosis – or locating the source of an error or fault – occurs in several areas of Computer Aided Design, such as dynamic verification, property checking, eq...
Görschwin Fey, Sean Safarpour, Andreas G. Ven...
DATE
2006
IEEE
125views Hardware» more  DATE 2006»
14 years 4 months ago
Formal performance analysis and simulation of UML/SysML models for ESL design
UML2 and SysML try to adopt techniques known from software development to systems engineering. However, the focus has been put on modeling aspects until now and quantitative perfo...
Alexander Viehl, Timo Schönwald, Oliver Bring...
GLOBECOM
2006
IEEE
14 years 4 months ago
An Evaluation of Ultra Wideband Technology for Indoor Ranging
Abstract— Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the ...
Camillo Gentile, Alfred Kik