Sciweavers

3555 search results - page 562 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WPES
2003
ACM
15 years 9 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
SIGCOMM
2010
ACM
15 years 4 months ago
Predictable 802.11 packet delivery from wireless channel measurements
RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to fin...
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wet...
BMCBI
2007
168views more  BMCBI 2007»
15 years 3 months ago
Bayesian model-based inference of transcription factor activity
Background: In many approaches to the inference and modeling of regulatory interactions using microarray data, the expression of the gene coding for the transcription factor is co...
Simon Rogers, Raya Khanin, Mark Girolami
ENVSOFT
2007
166views more  ENVSOFT 2007»
15 years 3 months ago
The implications of complexity for integrated resources management
: Integrated environmental resources management is a purposeful activity with the goal to maintain and improve the state of an environmental resource affected by human activities. ...
C. Pahl-Wostl
ICEIS
2007
IEEE
15 years 10 months ago
Opting for Innovation in Mobile Applications
In this paper we are concerned with innovation in the development of mobile applications. In particular, we address how we may come to think systematically about innovative aspects...
Jens Henrik Hosbond, Peter Axel Nielsen, Ivan Aaen