Sciweavers

3555 search results - page 244 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SERP
2010
15 years 3 months ago
The Viability of UML Models in Small Web Applications
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Jason Dudley, Devon Simmonds
TWC
2008
136views more  TWC 2008»
15 years 5 months ago
On Antijamming in General CDMA Systems-Part II: Antijamming Performance of Coded Multicarrier Frequency-Hopping Spread Spectrum
In the first part of the paper, the capacity of a general multiuser code division multiple access (CDMA) jamming channel was analyzed for noncooperative and cooperative users in up...
Reza Nikjah, Norman C. Beaulieu
BMCBI
2008
151views more  BMCBI 2008»
15 years 5 months ago
Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs
Background: Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes...
Hiroyuki Mishima, Andrew C. Lidral, Jun Ni
RTAS
2003
IEEE
15 years 10 months ago
VEST: An Aspect-Based Composition Tool for Real-Time Systems
Building distributed embedded systems from scratch is not cost-effective. Instead, designing and building these systems by using domain specific components has promise. However, i...
John A. Stankovic, Ruiqing Zhu, Ram Poornalingam, ...
SIGMOD
2007
ACM
108views Database» more  SIGMOD 2007»
16 years 5 months ago
Travel time estimation using NiagaraST and latte
To address increasing traffic congestion and its associated consequences, traffic managers are turning to intelligent transportation management. The latte project is extending dat...
Kristin Tufte, Jin Li, David Maier, Vassilis Papad...