Sciweavers

4166 search results - page 286 / 834
» Automating the constraining process
Sort
View
IADIS
2004
15 years 5 months ago
Detecting Unauthorized Use in Online Journal Archives: A Case Study
JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the...
Paul Seligman, Sean W. Smith
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 5 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 5 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
CACM
2000
108views more  CACM 2000»
15 years 4 months ago
The KidsRoom
The KidsRoom is a perceptually-based, interactive, narrative playspace for children. Images, music, narration, light, and sound effects are used to transform a normal child's...
Aaron F. Bobick, Stephen S. Intille, James W. Davi...
ICRA
2010
IEEE
108views Robotics» more  ICRA 2010»
15 years 2 months ago
Multi-turn, tension-stiffening catheter navigation system
—In poorly constrained extra-vascular environments such as hollow viscera, current catheter navigation techniques are restricted to simple paths and therefore limit a doctor’s ...
Yi Chen, Jean H. Chang, Alison S. Greenlee, Kennet...