Sciweavers

7055 search results - page 1335 / 1411
» Some New 4-Designs
Sort
View
COMPSAC
2004
IEEE
15 years 5 months ago
Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags
Software reliability is defined as the probability of failure-free software operation for a specified period of time in a specified environment. Over the past 30 years, many softw...
Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. ...
COMPSAC
2004
IEEE
15 years 5 months ago
Testing Context-Sensitive Middleware-Based Software Applications
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves accor...
T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Ts...
COOPIS
2004
IEEE
15 years 5 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
CSB
2004
IEEE
135views Bioinformatics» more  CSB 2004»
15 years 5 months ago
Selection of Patient Samples and Genes for Outcome Prediction
Gene expression profiles with clinical outcome data enable monitoring of disease progression and prediction of patient survival at the molecular level. We present a new computatio...
Huiqing Liu, Jinyan Li, Limsoon Wong
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 5 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
« Prev « First page 1335 / 1411 Last » Next »