Sciweavers

780 search results - page 70 / 156
» software 2011
Sort
View
CEJCS
2011
80views more  CEJCS 2011»
12 years 10 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
IACR
2011
292views more  IACR 2011»
12 years 9 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
NAR
2011
211views Computer Vision» more  NAR 2011»
13 years 24 days ago
DIMA 3.0: Domain Interaction Map
Domain Interaction MAp (DIMA, available at http:// webclu.bio.wzw.tum.de/dima) is a database of predicted and known interactions between protein domains. It integrates 5807 struct...
Qibin Luo, Philipp Pagel, Baiba Vilne, Dmitrij Fri...
AI
2012
Springer
12 years 5 months ago
Plan recognition in exploratory domains
This paper describes a challenging plan recognition problem that arises in environments in which agents engage widely in exploratory behavior, and presents new algorithms for eff...
Ya'akov Gal, Swapna Reddy, Stuart M. Shieber, Ande...
SIAMCOMP
2011
13 years 23 days ago
An Expansion Tester for Bounded Degree Graphs
We consider the problem of testing graph expansion (either vertex or edge) in the bounded degree model [10]. We give a property tester that given a graph with degree bound d, an ex...
Satyen Kale, C. Seshadhri