Sciweavers

3885 search results - page 232 / 777
» Clarifying Goal Models
Sort
View
FUIN
2000
68views more  FUIN 2000»
15 years 5 months ago
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
We consider the problem of dependable computation with multiple inputs. The goal is to study when redundancy can help to achieve survivability and when it cannot. We use AND/OR gra...
Yongge Wang, Yvo Desmedt, Mike Burmester
PAMI
2007
121views more  PAMI 2007»
15 years 4 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...
JOT
2010
144views more  JOT 2010»
15 years 3 months ago
REquirements, Aspects and Software Quality: the REASQ model
Object-oriented analysis and design have been more concerned with system functionality, neglecting non-functional aspects; the result is code which is tangled and difficult to main...
Isi Castillo, Francisca Losavio, Alfredo Matteo, J...
150
Voted
TASLP
2010
118views more  TASLP 2010»
15 years 3 months ago
Time-Frequency Sparsity by Removing Perceptually Irrelevant Components Using a Simple Model of Simultaneous Masking
Abstract—We present an algorithm for removing timefrequency components, found by a standard Gabor transform, of a “real-world” sound while causing no audible difference to th...
Péter Balázs, Bernhard Laback, Gerha...
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 3 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...