Sciweavers

1778 search results - page 335 / 356
» Building a Knowledge Base: An Example
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 4 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
TPHOL
2007
IEEE
15 years 4 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
ACIVS
2007
Springer
15 years 4 months ago
A Multi-touch Surface Using Multiple Cameras
Abstract. In this project we present a framework for a multi-touch surface using multiple cameras. With an overhead camera and side-mounted camera we determine the three dimensiona...
Itai Katz, Kevin Gabayan, Hamid K. Aghajan
SIGUCCS
2005
ACM
15 years 3 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
WOSP
2005
ACM
15 years 3 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu