Sciweavers

877 search results - page 173 / 176
» Intrusion detection systems as evidence
Sort
View
ICMCS
2009
IEEE
118views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Is this joke really funny? judging the mirth by audiovisual laughter analysis
This paper presents the results of an empirical study suggesting that, while laughter is a very good indicator of amusement, the kind of laughter (unvoiced laughter vs.voiced laug...
Stavros Petridis, Maja Pantic
ICSEA
2009
IEEE
14 years 7 months ago
Validation of Scenario-Based Business Requirements with Coloured Petri Nets
A scenario can be used to describe a possible instantiation of a given business use case and can be expressed for example as a list of steps written in natural language, or by an ...
Óscar R. Ribeiro, João M. Fernandes
BMCBI
2008
86views more  BMCBI 2008»
14 years 9 months ago
Is plant mitochondrial RNA editing a source of phylogenetic incongruence? An answer from in silico and in vivo data sets
Background: In plant mitochondria, the post-transcriptional RNA editing process converts C to U at a number of specific sites of the mRNA sequence and usually restores phylogeneti...
Ernesto Picardi, Carla Quagliariello
MOBISYS
2008
ACM
15 years 9 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
TSE
2002
157views more  TSE 2002»
14 years 9 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...