Sciweavers

1557 search results - page 198 / 312
» Autonomous Applications - Towards a Better Data Integration ...
Sort
View
113
Voted
SIGADA
2004
Springer
15 years 6 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
106
Voted
FGR
2006
IEEE
170views Biometrics» more  FGR 2006»
15 years 6 months ago
The Isometric Self-Organizing Map for 3D Hand Pose Estimation
We propose an Isometric Self-Organizing Map (ISOSOM) method for nonlinear dimensionality reduction, which integrates a Self-Organizing Map model and an ISOMAP dimension reduction ...
Haiying Guan, Rogério Schmidt Feris, Matthe...
148
Voted
FMCAD
2006
Springer
15 years 4 months ago
Design for Verification of the PCI-X Bus
The importance of re-usable Intellectual Properties (IPs) cores is increasing due to the growing complexity of today's system-on-chip and the need for rapid prototyping. In th...
Haja Moinudeen, Ali Habibi, Sofiène Tahar
104
Voted
NIPS
2007
15 years 2 months ago
Evaluating Search Engines by Modeling the Relationship Between Relevance and Clicks
We propose a model that leverages the millions of clicks received by web search engines to predict document relevance. This allows the comparison of ranking functions when clicks ...
Ben Carterette, Rosie Jones
78
Voted
BPM
2003
Springer
116views Business» more  BPM 2003»
15 years 6 months ago
Use Cases as Workflows
Abstract. In requirements engineering we have to discover the user requirements and then we have to transform them into precise system specifications. There are two essential aspec...
Michel R. V. Chaudron, Kees M. van Hee, Lou J. Som...