Sciweavers

6722 search results - page 1151 / 1345
» Reuse-Conducive Development Environments
Sort
View
130
Voted
ATAL
2007
Springer
15 years 7 months ago
On the benefits of cheating by self-interested agents in vehicular networks
As more and more cars are equipped with GPS and Wi-Fi transmitters, it becomes easier to design systems that will allow cars to interact autonomously with each other, e.g., regard...
Raz Lin, Sarit Kraus, Yuval Shavitt
139
Voted
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 7 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
132
Voted
MMB
2010
Springer
182views Communications» more  MMB 2010»
15 years 7 months ago
CrossTrace: Cross-Layer Measurement for IEEE 802.11 Wireless Testbeds
In this paper, we introduce and evaluate CrossTrace, a framework for performing cross-layer measurements in IEEE 802.11 based wireless networks. CrossTrace allows tracing of parame...
Simon Frohn, Sascha Gübner, Christoph Lindema...
101
Voted
ECRIME
2007
15 years 7 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
141
Voted
EUROMICRO
2007
IEEE
15 years 7 months ago
Guiding Component-Based Hardware/Software Co-Verification with Patterns
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge i...
Juncao Li, Fei Xie, Huaiyu Liu
« Prev « First page 1151 / 1345 Last » Next »