Sciweavers

457 search results - page 45 / 92
» Construction of a Highly Dependable Operating System
Sort
View
USS
2008
15 years 3 days ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
PAMI
2006
193views more  PAMI 2006»
14 years 9 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...
BMCBI
2007
198views more  BMCBI 2007»
14 years 9 months ago
Correlation analysis reveals the emergence of coherence in the gene expression dynamics following system perturbation
Time course gene expression experiments are a popular means to infer co-expression. Many methods have been proposed to cluster genes or to build networks based on similarity measu...
Nicola Neretti, Daniel Remondini, Marc Tatar, John...
ICPR
2008
IEEE
15 years 4 months ago
A corner strength based Fingerprint segmentation algorithm with dynamic thresholding
Segmentation is one of the first and most integral pre-processing steps for any Fingerprint Recognition System. It is used to identify the region of interest within an image. Perf...
Asim Baig, Ahmed Bouridane, Fatih Kurugollu
TPHOL
2009
IEEE
15 years 4 months ago
The HOL-Omega Logic
A new logic is posited for the widely used HOL theorem prover, as an extension of the existing higher order logic of the HOL4 system. The logic is extended to three levels, adding ...
Peter V. Homeier