Sciweavers

13895 search results - page 2445 / 2779
» Exploring
Sort
View
SAFECOMP
2007
Springer
15 years 10 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
SCALESPACE
2007
Springer
15 years 10 months ago
New Possibilities with Sobolev Active Contours
Recently, the Sobolev metric was introduced to define gradient flows of various geometric active contour energies. It was shown that the Sobolev metric out-performs the tradition...
Ganesh Sundaramoorthi, Anthony J. Yezzi, Andrea Me...
TGC
2007
Springer
15 years 10 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
UM
2007
Springer
15 years 10 months ago
The Effect of Model Granularity on Student Performance Prediction Using Bayesian Networks
A standing question in the field of Intelligent Tutoring Systems and User Modeling in general is what is the appropriate level of model granularity (how many skills to model) and h...
Zachary A. Pardos, Neil T. Heffernan, Brigham Ande...
VLDB
2007
ACM
94views Database» more  VLDB 2007»
15 years 10 months ago
iTrails: Pay-as-you-go Information Integration in Dataspaces
Dataspace management has been recently identified as a new agenda for information management [17, 22] and information integration [23]. In sharp contrast to standard information ...
Marcos Antonio Vaz Salles, Jens-Peter Dittrich, Sh...
« Prev « First page 2445 / 2779 Last » Next »