Sciweavers

1460 search results - page 42 / 292
» Very Lightweight Requirements Modeling
Sort
View
IMC
2007
ACM
13 years 11 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
ICIP
1997
IEEE
14 years 1 months ago
Model-Based Synthetic View Generation from a Monocular Video Sequence
International Conference on Image Processing (ICIP 97), vol. 1, pp. 444-447, Santa Barbara, October 1997. In this paper a model-based multi-view image generation system for video ...
Chun-Jen Tsai, Aggelos K. Katsaggelos, Peter Eiser...
TACAS
1997
Springer
87views Algorithms» more  TACAS 1997»
14 years 1 months ago
Integration in PVS: Tables, Types, and Model Checking
Abstract. We have argued previously that the e ectiveness of a veri cation system derives not only from the power of its individual features for expression and deduction, but from ...
Sam Owre, John M. Rushby, Natarajan Shankar
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
14 years 3 months ago
Q-DPM: An Efficient Model-Free Dynamic Power Management Technique
When applying Dynamic Power Management (DPM) technique to pervasively deployed embedded systems, the technique needs to be very efficient so that it is feasible to implement the t...
Min Li, Xiaobo Wu, Richard Yao, Xiaolang Yan
RE
2005
Springer
14 years 3 months ago
Do Viewpoints Lead to Better Conceptual Models? An Exploratory Case Study
The use of viewpoints has long been proposed as a technique to structure evolving requirements models. In theory, viewpoints should provide better stakeholder traceability, and th...
Steve M. Easterbrook, Eric S. K. Yu, Jorge Aranda,...