Sciweavers

410 search results - page 72 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
89
Voted
USS
2004
15 years 1 months ago
On User Choice in Graphical Password Schemes
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Darren Davis, Fabian Monrose, Michael K. Reiter
KDD
2007
ACM
202views Data Mining» more  KDD 2007»
16 years 2 days ago
Support feature machine for classification of abnormal brain activity
In this study, a novel multidimensional time series classification technique, namely support feature machine (SFM), is proposed. SFM is inspired by the optimization model of suppo...
Wanpracha Art Chaovalitwongse, Ya-Ju Fan, Rajesh C...
PE
2002
Springer
176views Optimization» more  PE 2002»
14 years 11 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
TASE
2010
IEEE
14 years 6 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
100
Voted
ISESE
2002
IEEE
15 years 4 months ago
Conducting Realistic Experiments in Software Engineering
An important goal of most empirical software engineering research is the transfer of research results to industrial applications. Two important obstacles for this transfer are the...
Dag I. K. Sjøberg, Bente Anda, Erik Arishol...