Sciweavers

3830 search results - page 463 / 766
» From Reference Model to Component Model
Sort
View
IWANN
2009
Springer
15 years 10 months ago
Bayesian Joint Estimation of CN and LOH Aberrations
SNP-microarrays are able to measure simultaneously both copy number and genotype at several single nucleotide polymorphism positions. Combining the two data, it is possible to bett...
Paola M. V. Rancoita, Marcus Hutter, Francesco Ber...
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Improving partial cover of Random Walks in large-scale Wireless Sensor Networks
Random Walks (RWs) have been considered for information dissemination in large scale, dynamic and unstructured environments, as they are scalable, robust to topology changes and d...
Leonidas Tzevelekas, Ioannis Stavrakakis
DATE
2007
IEEE
136views Hardware» more  DATE 2007»
15 years 10 months ago
Compositional specification of behavioral semantics
An emerging common trend in model-based design of embedded software and systems is the adoption of Domain-Specific Modeling Languages (DSMLs). While syntax metamodeling enables th...
Kai Chen 0003, Janos Sztipanovits, Sandeep Neema
ISPW
2006
IEEE
15 years 10 months ago
On Mobility of Software Processes
Abstract. In this paper, the mobility of software processes, a novel concept, is proposed. It is defined as the structural change in a software process resulting from interactions...
Mingshu Li, Qiusong Yang, Jian Zhai, Guowei Yang
ITNG
2006
IEEE
15 years 10 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar