Sciweavers

53390 search results - page 147 / 10678
» Computer Systems Analysis
Sort
View
CAISE
2004
Springer
15 years 10 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
132
Voted
HYBRID
2000
Springer
15 years 8 months ago
Ellipsoidal Techniques for Reachability Analysis
For the reach tube of a linear time-varying system with ellipsoidal bounds on the control variable consider the following approximation problem. Find a tight ellipsoid-valued tube...
Alexander B. Kurzhanski, Pravin Varaiya
164
Voted
AICT
2006
IEEE
130views Communications» more  AICT 2006»
15 years 7 months ago
A Search Theoretical Approach to P2P Networks: Analysis of Learning
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guaran...
Nazif Cihan Tas, Bedri Kamil Onur Tas
LSGRID
2004
Springer
15 years 10 months ago
Distributed Cell Biology Simulations with E-Cell System
Many useful applications of simulation in computational cell biology, e.g. kinetic parameter estimation, Metabolic Control Analysis (MCA), and bifurcation analysis, require a large...
Masahiro Sugimoto, Kouichi Takahashi, Tomoya Kitay...
CVPR
2008
IEEE
16 years 7 months ago
3D-2D spatiotemporal registration for sports motion analysis
Computer systems are increasingly being used for sports training. Existing sports training systems either require expensive 3D motion capture systems or do not provide intelligent...
Ruixuan Wang, Wee Kheng Leow, Hon Wai Leong
« Prev « First page 147 / 10678 Last » Next »