Sciweavers

3775 search results - page 732 / 755
» The Expression Problem Revisited
Sort
View
WISEC
2010
ACM
15 years 28 days ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
155
Voted
ICECCS
2010
IEEE
219views Hardware» more  ICECCS 2010»
15 years 28 days ago
Comparison of Six Ways to Extend the Scope of Cheddar to AADL v2 with Osate
Abstract—Cheddar is a framework dedicated to the specification of real-time schedulers, and to their analysis by simulation. It is developed in Ada. Some parts of its modular ar...
Mickaël Kerboeuf, Alain Plantec, Frank Singho...
118
Voted
AUTOMATICA
2007
238views more  AUTOMATICA 2007»
15 years 26 days ago
Fundamental limit of discrete-time systems in tracking multi-tone sinusoidal signals
This paper studies the tracking performance of linear time-invariant multi-variable discrete-time systems. The specific problem under consideration is to track a multi-tone sinus...
Weizhou Su, Li Qiu, Jie Chen
BIODATAMINING
2008
96views more  BIODATAMINING 2008»
15 years 26 days ago
Fast approximate hierarchical clustering using similarity heuristics
Background: Agglomerative hierarchical clustering (AHC) is a common unsupervised data analysis technique used in several biological applications. Standard AHC methods require that...
Meelis Kull, Jaak Vilo
101
Voted
BMCBI
2010
137views more  BMCBI 2010»
15 years 26 days ago
TreeGraph 2: Combining and visualizing evidence from different phylogenetic analyses
Background: Today it is common to apply multiple potentially conflicting data sources to a given phylogenetic problem. At the same time, several different inference techniques are...
Ben C. Stöver, Kai F. Müller