Sciweavers

8499 search results - page 135 / 1700
» cans 2009
Sort
View
ESSOS
2009
Springer
15 years 8 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
EUROCAST
2009
Springer
116views Hardware» more  EUROCAST 2009»
15 years 8 months ago
Complete Sets of Hamiltonian Circuits for Classification of Documents
The calculation of Hamiltonian Circuits is an NP-complete task. This paper uses slightly modified complete sets of Hamiltonian circuits for the classification of documents. The sol...
Bernd Steinbach, Christian Posthoff
EUROPAR
2009
Springer
15 years 8 months ago
Dynamic Detection of Uniform and Affine Vectors in GPGPU Computations
Abstract. We present a hardware mechanism which dynamically detects uniform and affine vectors used in Graphics Processing Units, to minimize pressure on the register file and redu...
Sylvain Collange, David Defour, Yao Zhang
119
Voted
HICSS
2009
IEEE
92views Biometrics» more  HICSS 2009»
15 years 8 months ago
An Assessment of Venues Providing Public Access to ICT: A Tale of 25 Countries
This paper is based on a comparative study of venues that provide public access to information and communication technologies in 25 countries. We study how diverse people can and ...
Christopher Coward, Ricardo Gomez, Rucha Ambikar
GLOBECOM
2009
IEEE
15 years 8 months ago
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks
Abstract--We present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and countermeasures on MANETs. In particular, we focus on ...
André König, Daniel Seither, Ralf Stei...