Sciweavers

556 search results - page 81 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 1 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
CW
2003
IEEE
15 years 7 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
AGENTS
1997
Springer
15 years 6 months ago
An Intelligent Assistant for Patient Health Care
The Patient Advocate is designed to be an intelligent assistant for patient-centered health care. Residing on a home computer or special-purpose device and operating within an ext...
Silvia Miksch, Kenneth Cheng, Barbara Hayes-Roth
125
Voted
IWCM
2004
Springer
15 years 7 months ago
Wiener-Optimized Discrete Filters for Differential Motion Estimation
Abstract. Differential motion estimation is based on detecting brightness changes in local image structures. Filters approximating the local gradient are applied to the image seque...
Kai Krajsek, Rudolf Mester
DAC
1995
ACM
15 years 5 months ago
Simultaneous Gate and Interconnect Sizing for Circuit-Level Delay Optimization
Abstract—With delays due to the physical interconnect dominating the overall logic path delays, circuit-level delay optimization must take interconnect effects into account. Inst...
Noel Menezes, Satyamurthy Pullela, Lawrence T. Pil...