Sciweavers

260 search results - page 42 / 52
» Dynamic polar diagram
Sort
View
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
80
Voted
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
15 years 10 months ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
85
Voted
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
15 years 1 months ago
Optimal latch mapping and retiming within a tree
We propose a technology mapping algorithm that takes existing structural technology-mapping algorithms based on dynamic programming [1,3,4] and extends them to retime pipelined cir...
Joel Grodstein, Eric Lehman, Heather Harkness, Her...
BMCBI
2008
102views more  BMCBI 2008»
14 years 9 months ago
Stability of the core domain of p53: insights from computer simulations
: The tumour suppressor protein p53 protein has a core domain that binds DNA and is the site for most oncogenic mutations. This domain is quite unstable compared to its homologs p...
Arumugam Madhumalar, Derek John Smith, Chandra Ver...
86
Voted
ACSC
2006
IEEE
15 years 3 months ago
Interaction design for a mobile context-aware system using discrete event modelling
This paper describes our experience when applying formal methods in the design of the tourist information system TIP, which presents context-sensitive information to mobile users ...
Annika Hinze, Petra Malik, Robi Malik