Sciweavers

3070 search results - page 486 / 614
» Making pattern mining useful
Sort
View
LICS
2006
IEEE
15 years 10 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
AAAI
2006
15 years 5 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
TCAD
2008
93views more  TCAD 2008»
15 years 4 months ago
Transforming Cyclic Circuits Into Acyclic Equivalents
Abstract--Designers and high-level synthesis tools can introduce unwanted cycles in digital circuits, and for certain combinational functions, cyclic circuits that are stable and d...
Osama Neiroukh, Stephen A. Edwards, Xiaoyu Song
MICCAI
2004
Springer
16 years 5 months ago
Automatic Segmentation of Neonatal Brain MRI
This paper describes an automatic tissue segmentation method for neonatal MRI. The analysis and study of neonatal brain MRI is of great interest due to its potential for studying e...
Marcel Prastawa, John H. Gilmore, Weili Lin, Guido...
ACSAC
2006
IEEE
15 years 10 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg