Sciweavers

1036 search results - page 159 / 208
» Utilizing Validation Experience for System Validation
Sort
View
ICN
2009
Springer
14 years 2 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ITICSE
2009
ACM
14 years 2 months ago
Software reuse and plagiarism: a code of practice
In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a signiï¬...
J. Paul Gibson
GLOBECOM
2008
IEEE
14 years 2 months ago
MIMO Receiver Design in the Presence of Radio Frequency Interference
—Multi-input multi-output (MIMO) receivers have been designed and their communication performance analyzed under the assumption of additive Gaussian noise. Wireless transceivers,...
Kapil Gulati, Aditya Chopra, Robert W. Heath Jr., ...
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
14 years 2 months ago
Learning by Propagability
In this paper, we present a novel feature extraction framework, called learning by propagability. The whole learning process is driven by the philosophy that the data labels and o...
Bingbing Ni, Shuicheng Yan, Ashraf A. Kassim, Loon...
ICRA
2008
IEEE
119views Robotics» more  ICRA 2008»
14 years 2 months ago
Modeling assembled-MEMS microrobots for wireless magnetic control
— Capitalizing on advances in CMOS and MEMS technologies, microrobots have the potential to dramatically change many aspects of medicine by navigating bodily fluids to perform t...
Zoltán Nagy, Olgaç Ergeneman, Jake J...