Sciweavers

1829 search results - page 291 / 366
» Towards Validation of Requirements Models
Sort
View
ACSC
2009
IEEE
15 years 11 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ISBI
2009
IEEE
15 years 11 months ago
Improving M/EEG Source Localization with an Inter-Condition Sparse Prior
The inverse problem with distributed dipoles models in M/EEG is strongly ill-posed requiring to set priors on the solution. Most common priors are based on a convenient ℓ2 norm....
Alexandre Gramfort, Matthieu Kowalski
ICC
2009
IEEE
134views Communications» more  ICC 2009»
15 years 11 months ago
Voice Service Support over Cognitive Radio Networks
—In this paper, quality of service (QoS) provisioning for voice service over cognitive radio networks is considered. As voice traffic is sensitive to delay, the presence of prim...
Ping Wang, Dusit Niyato, Hai Jiang
INFOCOM
2007
IEEE
15 years 11 months ago
Balancing Interruption Frequency and Buffering Penalties in VBR Video Streaming
—The main goal of a streaming application is to enable the successful decoding of each video object before its displaying deadline is violated, and to recover from a deadline vio...
Guanfeng Liang, Ben Liang
VTS
2007
IEEE
116views Hardware» more  VTS 2007»
15 years 11 months ago
Case Study: Soft Error Rate Analysis in Storage Systems
Soft errors due to cosmic particles are a growing reliability threat for VLSI systems. In this paper we analyze the soft error vulnerability of FPGAs used in storage systems. Sinc...
Brian Mullins, Hossein Asadi, Mehdi Baradaran Taho...