Sciweavers

1906 search results - page 156 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
132
Voted
IPMI
1999
Springer
15 years 8 months ago
The Distribution of Target Registration Error in Rigid-Body, Point-Based Registration
—Guidance systems designed for neurosurgery, hip surgery, spine surgery and for approaches to other anatomy that is relatively rigid can use rigid-body transformations to accompl...
Jay B. West, J. Michael Fitzpatrick
138
Voted
CASES
2010
ACM
15 years 1 months ago
Hardware trust implications of 3-D integration
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductiv...
Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cy...
192
Voted
ECOOP
1999
Springer
15 years 8 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
126
Voted
DSOM
2006
Springer
15 years 7 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
128
Voted
NIPS
2003
15 years 5 months ago
Ambiguous Model Learning Made Unambiguous with 1/f Priors
What happens to the optimal interpretation of noisy data when there exists more than one equally plausible interpretation of the data? In a Bayesian model-learning framework the a...
Gurinder S. Atwal, William Bialek