Sciweavers

16070 search results - page 232 / 3214
» Identifying
Sort
View
SECON
2007
IEEE
15 years 11 months ago
On the Prevalence of Sensor Faults in Real-World Deployments
—Various sensor network measurement studies have reported instances of transient faults in sensor readings. In this work, we seek to answer a simple question: How often are such ...
Abhishek Sharma, Leana Golubchik, Ramesh Govindan
SOCA
2007
IEEE
15 years 11 months ago
Static Analysis of Business Artifact-centric Operational Models
Business Artifacts are the core entities used by businesses to record information pertinent to their operations. Business operational models are representations of the processing ...
Cagdas E. Gerede, Kamal Bhattacharya, Jianwen Su
SAFECOMP
2007
Springer
15 years 11 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
HAPTICS
2006
IEEE
15 years 11 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 11 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du