Sciweavers

1336 search results - page 130 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
116
Voted
IJEB
2008
101views more  IJEB 2008»
15 years 3 months ago
Applying a Customer Value Model in mobile communication business
: Communication services are currently confronted with large changes due to the price erosion of services and the entry of new service providers. The gap has been filled with diffe...
Mikko Pynnönen, Jukka Hallikas
111
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
110
Voted
SASO
2009
IEEE
15 years 10 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
121
Voted
ICIP
2003
IEEE
16 years 5 months ago
Adaptive rule-based recognition of events in video sequences
Knowledge-based fuzzy inference and neural learning are used in this paper in order to model the event recognition task in semantic video analysis. The advantage of their use is t...
Vassilis Tzouvaras, Gabriel Tsechpenakis, Giorgos ...
144
Voted
ISPASS
2010
IEEE
15 years 10 months ago
Dynamic program analysis of Microsoft Windows applications
—Software instrumentation is a powerful and flexible technique for analyzing the dynamic behavior of programs. By inserting extra code in an application, it is possible to study...
Alex Skaletsky, Tevi Devor, Nadav Chachmon, Robert...