Sciweavers

1040 search results - page 169 / 208
» Controlling Aspect Reentrancy
Sort
View
74
Voted
CORR
2008
Springer
97views Education» more  CORR 2008»
15 years 18 days ago
Towards a Spreadsheet Engineering
In this paper, we report some on-going focused research, but are further keen to set it in the context of a proposed bigger picture, as follows. There is a certain depressing patt...
V. R. Vemula, David Ball, Simon R. Thorne
91
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 17 days ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux
125
Voted
CVIU
2008
203views more  CVIU 2008»
15 years 17 days ago
A computer vision model for visual-object-based attention and eye movements
This paper presents a new computational framework for modelling visual-object based attention and attention-driven eye movements within an integrated system in a biologically insp...
Yaoru Sun, Robert B. Fisher, Fang Wang, Herman Mar...
113
Voted
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 15 days ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
107
Voted
IJNSEC
2006
89views more  IJNSEC 2006»
15 years 14 days ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara