Sciweavers

892 search results - page 68 / 179
» Calculating with Requirements
Sort
View
ICICS
2009
Springer
15 years 7 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
CBMS
2006
IEEE
15 years 6 months ago
Efficient Rotation Invariant Retrieval of Shapes with Applications in Medical Databases
Recognition of shapes in images is an important problem in computer vision with application in various medical problems, including robotic surgery and cell analysis. The similarit...
Selina Chu, Shrikanth S. Narayanan, C. C. Jay Kuo
125
Voted
VTC
2007
IEEE
198views Communications» more  VTC 2007»
15 years 7 months ago
A Distributed Node Scheduling Protocol Considering Sensing Coverage in Wireless Sensor Networks
Abstract— A crucial issue in deploying wireless sensor networks is to perform a sensing task in an area of interest in an energy-efficient manner since sensor nodes have limited...
Jaekyu Cho, Gilsoo Kim, Taekyoung Kwon, Yanghee Ch...
114
Voted
PICS
2001
15 years 2 months ago
Dot Placement Analysis Using a Line Scan Camera and Rigid Body Rotation
Printer manufacturers design print heads and halftone patterns to result in specific types of image characteristics. Many image quality artifacts are a result of differences in ac...
Yair Kipman, Kate Johnson
107
Voted
WCET
2010
14 years 10 months ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner