Sciweavers

4815 search results - page 325 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
PODS
2003
ACM
114views Database» more  PODS 2003»
16 years 5 months ago
An information-theoretic approach to normal forms for relational and XML data
Normalization as a way of producing good database designs is a well-understood topic. However, the same problem of distinguishing well-designed databases from poorly designed ones...
Marcelo Arenas, Leonid Libkin
MMMACNS
2010
Springer
15 years 3 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
PERCOM
2005
ACM
16 years 4 months ago
Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to und...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
MICCAI
1999
Springer
15 years 9 months ago
A New Approach to 3D Sulcal Ribbon Finding from MR Images
Abstract. Sulcal medial surfaces are 3D thin convoluted ribbons embedded in cortical sulci, and they provide distinctive anatomical features of the brain. Here we propose a new app...
Xiaolan Zeng, Lawrence H. Staib, Robert T. Schultz...
ICCD
2001
IEEE
119views Hardware» more  ICCD 2001»
16 years 1 months ago
A Functional Validation Technique: Biased-Random Simulation Guided by Observability-Based Coverage
We present a simulation-based semi-formal verification method for sequential circuits described at the registertransfer level. The method consists of an iterative loop where cove...
Serdar Tasiran, Farzan Fallah, David G. Chinnery, ...