Sciweavers

877 search results - page 173 / 176
» Intrusion detection systems as evidence
Sort
View
ICMCS
2009
IEEE
118views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Is this joke really funny? judging the mirth by audiovisual laughter analysis
This paper presents the results of an empirical study suggesting that, while laughter is a very good indicator of amusement, the kind of laughter (unvoiced laughter vs.voiced laug...
Stavros Petridis, Maja Pantic
ICSEA
2009
IEEE
14 years 9 months ago
Validation of Scenario-Based Business Requirements with Coloured Petri Nets
A scenario can be used to describe a possible instantiation of a given business use case and can be expressed for example as a list of steps written in natural language, or by an ...
Óscar R. Ribeiro, João M. Fernandes
BMCBI
2008
86views more  BMCBI 2008»
14 years 11 months ago
Is plant mitochondrial RNA editing a source of phylogenetic incongruence? An answer from in silico and in vivo data sets
Background: In plant mitochondria, the post-transcriptional RNA editing process converts C to U at a number of specific sites of the mRNA sequence and usually restores phylogeneti...
Ernesto Picardi, Carla Quagliariello
MOBISYS
2008
ACM
15 years 11 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
TSE
2002
157views more  TSE 2002»
14 years 11 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...