Sciweavers

1891 search results - page 158 / 379
» Interactive Analysis of Computer Crimes
Sort
View
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
145
Voted
LREC
2010
173views Education» more  LREC 2010»
15 years 6 months ago
Heterogeneous Data Sources for Signed Language Analysis and Synthesis: The SignCom Project
This paper describes how heterogeneous data sources captured in the SignCom project may be used for the analysis and synthesis of French Sign Language (LSF) utterances. The captur...
Kyle Duarte, Sylvie Gibet
IJCAT
2008
72views more  IJCAT 2008»
15 years 5 months ago
Capacity analysis of container terminals using simulation techniques
Modeling and simulation are essential tools for the design and analysis of container terminals. A computer model can emulate the activities at various levels of details and captur...
Shell-Ying Huang, Wen-Jing Hsu, Chuanyu Chen, Rong...
PE
2006
Springer
107views Optimization» more  PE 2006»
15 years 5 months ago
Efficient steady-state analysis of second-order fluid stochastic Petri nets
This paper presents an efficient solution technique for the steady-state analysis of the second-order Stochastic Fluid Model underlying a second-order Fluid Stochastic Petri Net (...
Marco Gribaudo, Rossano Gaeta
PTS
2010
167views Hardware» more  PTS 2010»
15 years 3 months ago
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases
The addition of a cross-cutting concern in a program, through aspect weaving, has an impact on its existing behaviors. If test cases exist for the program, it is necessary to ident...
Romain Delamare, Freddy Munoz, Benoit Baudry, Yves...