Sciweavers

3555 search results - page 211 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
CBRMD
2008
167views more  CBRMD 2008»
15 years 4 months ago
Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity
Intelligent analysis of heterogeneous data and information sources for efficient decision support presents an interesting yet challenging task in clinical environments. This is par...
Mobyen Uddin Ahmed, Shahina Begum, Peter Funk, Nin...
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 9 months ago
Consumers cognition towards communities: Customer-centred community design using the means-end chain perspective
This paper presents research on the application of the means-end chain (MEC) framework for investigating customers cognitive structure regarding community applications. It is argu...
Peter Aschmoneit, Mark Heitmann
TSP
2008
90views more  TSP 2008»
15 years 4 months ago
Generalized Correlation Decomposition-Based Blind Channel Estimation in DS-CDMA Systems With Unknown Wide-Sense Stationary Noise
A new blind subspace-based channel estimation technique is proposed for direct-sequence code-division multiple access (DS-CDMA) systems operating in the presence of unknown wide-se...
Keyvan Zarifi, Alex B. Gershman
NLDB
2000
Springer
15 years 8 months ago
Conceptual Patterns - A Consolidation of Coad's and Wohed's Approaches
: The information system analysis process is considered as a difficult phase during the information systems development. The difficulty lies in gathering relevant information from ...
Petia Wohed