Sciweavers

6047 search results - page 307 / 1210
» Modeling with Extend
Sort
View
155
Voted
PERCOM
2006
ACM
16 years 4 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
BIOCOMP
2006
15 years 6 months ago
Basic Reproductive Rate of a Spatial Epidemic Seir Model using Computer Algebra Software
The use of computer algebra software has many applications in diverse fields like epidemiology. This work pretends to show how computer algebra software applications for symbolic ...
Sebastian Guzmán, Juan Fernando Ospina
INFOCOM
2008
IEEE
15 years 11 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
142
Voted
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 10 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
120
Voted
GG
2004
Springer
15 years 10 months ago
Model Checking Graph Transformations: A Comparison of Two Approaches
Model checking is increasingly popular for hardware and, more recently, software verification. In this paper we describe two different approaches to extend the benefits of model ...
Arend Rensink, Ákos Schmidt, Dániel ...