Sciweavers

6722 search results - page 1078 / 1345
» Reuse-Conducive Development Environments
Sort
View
VOTEID
2007
Springer
15 years 10 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
WAPCV
2007
Springer
15 years 10 months ago
Reinforcement Learning for Decision Making in Sequential Visual Attention
The innovation of this work is the provision of a system that learns visual encodings of attention patterns and that enables sequential attention for object detection in real world...
Lucas Paletta, Gerald Fritz
AGILEDC
2006
IEEE
15 years 10 months ago
Embedded Agile Project by the Numbers With Newbies
There is a class of projects that can only be accomplished via agile practices due to their complexity and risks. It is rare for such a project to be staffed with newbies but it h...
Nancy Van Schooenderwoert
AICT
2006
IEEE
113views Communications» more  AICT 2006»
15 years 10 months ago
QoS awareness support in Web-Service semantics
Web Services (WSs) are a new breed of web application that have brought out quite challenging research issues. One of these is the establishment of an interoperable semantic frame...
Dimitrios T. Tsesmetzis, Ioanna Roussaki, Ioannis ...
ASWEC
2006
IEEE
15 years 10 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
« Prev « First page 1078 / 1345 Last » Next »