Sciweavers

6147 search results - page 75 / 1230
» Requirements, Architectures and Risks
Sort
View
CSREASAM
2003
15 years 1 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
ECOI
2006
59views more  ECOI 2006»
14 years 12 months ago
Model-building with interpolated temporal data
Ecological data can be difficult to collect, and as a result, some important temporal ecological datasets contain irregularly sampled data. Since many temporal modelling technique...
Robert I. McKay, Tuan Hao Hoang, Naoki Mori, Nguye...
SIGPRO
2010
154views more  SIGPRO 2010»
14 years 10 months ago
UPRE method for total variation parameter selection
Total Variation (TV) regularization is a popular method for solving a wide variety of inverse problems in image processing. In order to optimize the reconstructed image, it is imp...
Youzuo Lin, Brendt Wohlberg, Hongbin Guo
SOCIALCOM
2010
14 years 9 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
ENTCS
2006
161views more  ENTCS 2006»
14 years 12 months ago
Architecture Normalization for Component-based Systems
Being able to systematically change the original architecture of a component-based system to a desired target architecture without changing the set of functional requirements of t...
Lian Wen, R. Geoff Dromey