Sciweavers

3119 search results - page 561 / 624
» Abstract Requirement Analysis in Multiagent System Design
Sort
View
CCS
2008
ACM
15 years 5 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
129
Voted
ADAEUROPE
2005
Springer
15 years 5 months ago
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet
This paper presents the design and implementation of RT-EP (Real-Time Ethernet Protocol), which is a software-based token-passing Ethernet protocol for multipoint communications in...
José María Martínez, Michael ...
149
Voted
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
125
Voted
WSC
2004
15 years 5 months ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett
AAAI
1993
15 years 4 months ago
A Method for Development of Dialogue Managers for Natural Language Interfaces
This paper describes a method for the development of dialogue managers for natural language interfaces. A dialogue manager is presented designed on the basis of both a theoretical...
Arne Jönsson