Sciweavers

6812 search results - page 91 / 1363
» Detection of Information Flows
Sort
View
JCIT
2007
62views more  JCIT 2007»
15 years 1 months ago
Identification of Economic Cluster with Information Gain Method, based on Input-Output Tables
In this paper, we propose a more flexible “economic cluster identification” approach to analyzing the domestic I/O flows of intermediary goods and service that is based on inf...
Bae Sangbin, Moon Kyungil
DAC
2008
ACM
15 years 3 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
AGENTS
2000
Springer
15 years 5 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
IFIP
2009
Springer
14 years 11 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
TIP
2010
121views more  TIP 2010»
14 years 8 months ago
Robust Processing of Optical Flow of Fluids
Abstract--This paper proposes a new approach, coupling physical models and image estimation techniques, for modelling the movement of fluids. The fluid flow is characterized by tur...
Ashish Doshi, Adrian G. Bors