Sciweavers

3775 search results - page 732 / 755
» The Expression Problem Revisited
Sort
View
WISEC
2010
ACM
14 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICECCS
2010
IEEE
219views Hardware» more  ICECCS 2010»
14 years 9 months ago
Comparison of Six Ways to Extend the Scope of Cheddar to AADL v2 with Osate
Abstract—Cheddar is a framework dedicated to the specification of real-time schedulers, and to their analysis by simulation. It is developed in Ada. Some parts of its modular ar...
Mickaël Kerboeuf, Alain Plantec, Frank Singho...
AUTOMATICA
2007
238views more  AUTOMATICA 2007»
14 years 9 months ago
Fundamental limit of discrete-time systems in tracking multi-tone sinusoidal signals
This paper studies the tracking performance of linear time-invariant multi-variable discrete-time systems. The specific problem under consideration is to track a multi-tone sinus...
Weizhou Su, Li Qiu, Jie Chen
BIODATAMINING
2008
96views more  BIODATAMINING 2008»
14 years 9 months ago
Fast approximate hierarchical clustering using similarity heuristics
Background: Agglomerative hierarchical clustering (AHC) is a common unsupervised data analysis technique used in several biological applications. Standard AHC methods require that...
Meelis Kull, Jaak Vilo
BMCBI
2010
137views more  BMCBI 2010»
14 years 9 months ago
TreeGraph 2: Combining and visualizing evidence from different phylogenetic analyses
Background: Today it is common to apply multiple potentially conflicting data sources to a given phylogenetic problem. At the same time, several different inference techniques are...
Ben C. Stöver, Kai F. Müller