Sciweavers

1884 search results - page 99 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
RAID
2001
Springer
15 years 2 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
PLILP
1994
Springer
15 years 2 months ago
Dynamic Dependence in Term rewriting Systems and its Application to Program Slicing
Abstract. Program slicing is a useful technique for debugging, testing, and analyzing programs. A program slice consists of the parts of a program which (potentially) affect the va...
John Field, Frank Tip
MICCAI
2007
Springer
15 years 11 months ago
Image Guidance of Intracardiac Ultrasound with Fusion of Pre-operative Images
Abstract. This paper presents a method for registering 3D intracardiac echo (ICE) to pre-operative images. A magnetic tracking sensor is integrated on the ICE catheter tip to provi...
Yiyong Sun, Samuel Kadoury, Yong Li, Matthias John...
IVA
2009
Springer
15 years 4 months ago
Methodologies for the User Evaluation of the Motion of Virtual Humans
Abstract. Virtual humans are employed in many interactive applications, including (serious) games. Their motion should be natural and allow interaction with its surroundings and ot...
Sander E. M. Jansen, Herwin van Welbergen
PREMI
2007
Springer
15 years 4 months ago
An Adaptive Bayesian Technique for Tracking Multiple Objects
Abstract. Robust tracking of objects in video is a key challenge in computer vision with applications in automated surveillance, video indexing, human-computer-interaction, gesture...
Pankaj Kumar, Michael J. Brooks, Anton van den Hen...