Sciweavers

42 search results - page 2 / 9
» How will the fabless model survive
Sort
View
CMPB
2008
63views more  CMPB 2008»
13 years 3 months ago
SAS and R functions to compute pseudo-values for censored data regression
Recently, in a series of papers, a method based on pseudo-values has been proposed for direct regression modeling of the survival function, the restricted mean and cumulative inci...
John P. Klein, Mette Gerster, Per Kragh Andersen, ...
NN
2000
Springer
123views Neural Networks» more  NN 2000»
13 years 4 months ago
Visual cortical mechanisms of perceptual grouping: interacting layers, networks, columns, and maps
The visual cortex has a laminar organization whose circuits form functional columns in cortical maps. How this laminar architecture supports visual percepts is not well understood...
William D. Ross, Stephen Grossberg, Ennio Mingolla
IWSAS
2001
Springer
13 years 9 months ago
Exercising Qualitative Control in Autonomous Adaptive Survivable Systems
We seek to construct autonomous adaptive survivable systems that use active trust management to adapt their own behavior in the face of compromises in the computational environment...
Jon Doyle, Michael McGeachie
AIM
2002
13 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
IEEEIAS
2008
IEEE
13 years 11 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro