Sciweavers

410 search results - page 72 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
USS
2004
13 years 10 months ago
On User Choice in Graphical Password Schemes
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Darren Davis, Fabian Monrose, Michael K. Reiter
KDD
2007
ACM
202views Data Mining» more  KDD 2007»
14 years 9 months ago
Support feature machine for classification of abnormal brain activity
In this study, a novel multidimensional time series classification technique, namely support feature machine (SFM), is proposed. SFM is inspired by the optimization model of suppo...
Wanpracha Art Chaovalitwongse, Ya-Ju Fan, Rajesh C...
PE
2002
Springer
176views Optimization» more  PE 2002»
13 years 8 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
TASE
2010
IEEE
13 years 3 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
ISESE
2002
IEEE
14 years 1 months ago
Conducting Realistic Experiments in Software Engineering
An important goal of most empirical software engineering research is the transfer of research results to industrial applications. Two important obstacles for this transfer are the...
Dag I. K. Sjøberg, Bente Anda, Erik Arishol...