Sciweavers

1156 search results - page 56 / 232
» The PENG System: Practice and Experience
Sort
View
ICALT
2003
IEEE
15 years 4 months ago
New Approaches to Media-Supported Project Work at the University Level
We present experiences made with a course in applied computer science which was based on the concept of communities of practice. Within the scope of the course “Entrepreneurship...
Ralf Klamma, Matthias Jarke, Markus Rohde, Volker ...
ERSHOV
2003
Springer
15 years 4 months ago
Integration of Functional and Timed Testing of Real-Time and Concurrent Systems
The article presents an approach to model based testing of complex systems based on a generalization of finite state machines (FSM) and input output state machines (IOSM). The app...
Victor V. Kuliamin, Alexandre Petrenko, Nick V. Pa...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 5 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
KES
2007
Springer
14 years 11 months ago
Dynamic route planning for car navigation systems using virus genetic algorithms
This paper describes a practical dynamic route planning method using real road maps in a wide area. The maps include traffic signals, road classes, and the number of lanes. The pr...
Hitoshi Kanoh
PERCOM
2006
ACM
15 years 10 months ago
Enabling Energy-Efficient and Quality Localization Services
Recent localization research has focused on improving the accuracy of pinpointing the physical location of a target. We think that the energy efficiency and the quality of the loc...
Tsung-Han Lin, Polly Huang, Hao-Hua Chu, Hsing-Hau...