Sciweavers

2757 search results - page 415 / 552
» On separating systems
Sort
View
WIMOB
2009
IEEE
15 years 11 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
ICPP
2009
IEEE
15 years 11 months ago
Load Balance in the Phylogenetic Likelihood Kernel
—Recent advances in DNA sequencing techniques have led to an unprecedented accumulation and availability of molecular sequence data that needs to be analyzed. This data explosion...
Alexandros Stamatakis, Michael Ott
ICRA
2009
IEEE
100views Robotics» more  ICRA 2009»
15 years 11 months ago
Three-dimensional measurement of objects in water by using space encoding method
—In this paper, a new method for 3-D measurement of objects in water is proposed. When observing objects in water through a camera contained in a waterproof housing or observing ...
Ryohei Kawai, Atsushi Yamashita, Toru Kaneko
ICST
2009
IEEE
15 years 11 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
143
Voted
LAWEB
2009
IEEE
15 years 11 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...