Sciweavers

4511 search results - page 781 / 903
» Observation Based System Security
Sort
View
IWPC
2007
IEEE
15 years 4 months ago
A Comparative Study of Three Program Exploration Tools
Programmers need tools to help explore large software systems when performing software evolution tasks. A variety of tools have been created to improve the effectiveness of such e...
Brian de Alwis, Gail C. Murphy, Martin P. Robillar...
IPSN
2007
Springer
15 years 4 months ago
Power scheduling for wireless sensor and actuator networks
We previously presented a model for some wireless sensor and actuator network (WSAN) applications based on the vector space tools of frame theory. In this WSAN model there is a we...
Christopher J. Rozell, Don H. Johnson
PERVASIVE
2007
Springer
15 years 4 months ago
Using Ground Reaction Forces from Gait Analysis: Body Mass as a Weak Biometric
Ground reaction forces generated during normal walking have recently been used to identify and/or classify individuals based upon the pattern of the forces observed over time. One ...
Jam Jenkins, Carla Schlatter Ellis
HICSS
2006
IEEE
198views Biometrics» more  HICSS 2006»
15 years 4 months ago
Modeling Initial and Repeat Online Trust in B2C E-Commerce
Prior research has demonstrated that the degrees and impact of customer trust on purchase intentions change with online experience. While online trust research has incorporated an...
Wei-Chang Kong, Yu-Ting Caisy Hung
ICRA
2006
IEEE
113views Robotics» more  ICRA 2006»
15 years 4 months ago
Integration of Dependent Bayesian Filters for Robust Tracking
— Robotics applications based on computer vision algorithms are highly constrained to indoor environments where conditions may be controlled. The development of robust visual alg...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...