Sciweavers

4616 search results - page 276 / 924
» Extreme Components Analysis
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
WECWIS
2009
IEEE
168views ECommerce» more  WECWIS 2009»
15 years 11 months ago
SARI-SQL: Event Query Language for Event Analysis
Complex Event Processing (CEP) systems are capable of processing large amounts of events, utilizing them to monitor, steer and optimize business in real time. The lack of tracking...
Szabolcs Rozsnyai, Josef Schiefer, Heinz Roth
ICASSP
2008
IEEE
15 years 11 months ago
Target detection and identification using canonical correlation analysis and subspace partitioning
We present a data-driven approach for target detection and identification based on a linear mixture model. Our aim is to determine the existence of certain targets in a mixture w...
Wei Wang 0018, Tülay Adali, Darren Emge
AICCSA
2007
IEEE
120views Hardware» more  AICCSA 2007»
15 years 11 months ago
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks
:- A software product spends more than 65% of its lifecycle in maintenance. Software systems with good maintainability can be easily modified to fix faults. In this paper, we adapt...
Walid Abdelmoez, Katerina Goseva-Popstojanova, Han...
CSR
2007
Springer
15 years 11 months ago
Estimation of the Click Volume by Large Scale Regression Analysis
Abstract. How could one estimate the total number of clicks a new advertisement could potentially receive in the current market? This question, called the click volume estimation p...
Yury Lifshits, Dirk Nowotka