Sciweavers

3504 search results - page 521 / 701
» Secure protocol composition
Sort
View
100
Voted
ECOOP
2010
Springer
15 years 6 months ago
Programming Coordinated Behavior in Java
Following the scenario-based approach to programming which centered around live sequence charts (LSCs), we propose a general approach to software development in Java. A program wil...
David Harel, Assaf Marron, Gera Weiss
GLOBECOM
2009
IEEE
14 years 11 months ago
Coding Strategies for Bidirectional Relaying for Arbitrarily Varying Channels
In this work we study optimal coding strategies for bidirectional relaying under the condition of arbitrarily varying channels. We consider a three-node network where a relay node ...
Rafael F. Wyrembelski, Igor Bjelakovic, Holger Boc...
HCI
2009
14 years 11 months ago
Considerations for Designing Response Quantification Procedures in Non-traditional Psychophysiological Applications
Abstract. Psychophysiological assessment in the context of virtual environments is a promising means for benchmarking the efficacy and ecological validity of virtual reality scenar...
A. V. Iyer, L. D. Cosand, Christopher G. Courtney,...
100
Voted
DOCENG
2010
ACM
15 years 2 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
BMCBI
2008
115views more  BMCBI 2008»
15 years 1 months ago
Probe signal correction for differential methylation hybridization experiments
Background: Non-biological signal (or noise) has been the bane of microarray analysis. Hybridization effects related to probe-sequence composition and DNA dye-probe interactions h...
Dustin P. Potter, Pearlly Yan, Tim Hui-Ming Huang,...