Sciweavers

170 search results - page 27 / 34
» micro 2007
Sort
View
SAFECOMP
2007
Springer
14 years 4 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
MOBISYS
2007
ACM
14 years 9 months ago
Universal real-time navigational assistance (URNA): an urban bluetooth beacon for the blind
We describe a complete hardware/software system, dubbed Universal Real-Time Navigational Assistance (URNA), which enables communication of relevant location-aware information to a...
S. Bohonos, A. Lee, A. Malik, C. Thai, Roberto Man...
CSMR
2007
IEEE
14 years 4 months ago
A Feature-Oriented Adaptive Component Model for Dynamic Evolution
Dynamic adaptation has been an essential requirement for more and more business systems. Some research works have focused on the structural or behavioral changes of adaptive progr...
Xin Peng, Yijian Wu, Wenyun Zhao
IJCNN
2007
IEEE
14 years 4 months ago
Limited receptive area neural classifier for recognition of swallowing sounds using short-time Fourier transform
— In this paper we propose a sound recognition technique based on the limited receptive area (LIRA) neural classifier and short-time Fourier transform (STFT). LIRA neural classif...
Oleksandr Makeyev, Edward Sazonov, Stephanie A. C....
ISBI
2007
IEEE
14 years 4 months ago
An Iterative Method for Registration of High-Resolution Cardiac Histoanatomical and Mri Images
Cardiac computational models of electrical conduction, mechanical activation, hemodynamics and metabolism require detailed information about the structural arrangement of function...
Tahier Mansoori, Gernot Plank, Rebecca Burton, J&u...