Sciweavers

1336 search results - page 132 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
143
Voted
WSDM
2012
ACM
258views Data Mining» more  WSDM 2012»
13 years 11 months ago
Large-scale analysis of individual and task differences in search result page examination strategies
Understanding the impact of individual and task differences on search result page examination strategies is important in developing improved search engines. Characterizing these e...
Georg Buscher, Ryen W. White, Susan T. Dumais, Jef...
131
Voted
RTSS
1998
IEEE
15 years 8 months ago
Improved Response-Time Analysis Calculations
Schedulability analysis of fixed priority preemptive scheduled systems can be performed by calculating the worst-case response-time of the involved processes. The system is deemed...
Mikael Sjödin, Hans Hansson
192
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 10 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
144
Voted
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 10 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
123
Voted
ICRA
2007
IEEE
140views Robotics» more  ICRA 2007»
15 years 10 months ago
On the Observability of Bearing-only SLAM
— In this paper we present an observability analysis for a mobile robot performing SLAM with a single monocular camera. The aim is to get a better understanding of the well known...
Teresa Vidal-Calleja, Mitch Bryson, Salah Sukkarie...