Sciweavers

963 search results - page 59 / 193
» Modeling and analysis of real -time systems with mutex compo...
Sort
View
CORR
2010
Springer
101views Education» more  CORR 2010»
14 years 10 months ago
Computing the Least Fixed Point of Positive Polynomial Systems
We consider equation systems of the form X1 = f1(X1, . . . , Xn), . . . , Xn = fn(X1, . . . , Xn) where f1, . . . , fn are polynomials with positive real coefficients. In vector fo...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
FGR
1998
IEEE
165views Biometrics» more  FGR 1998»
15 years 2 months ago
Face Similarity Space as Perceived by Humans and Artificial Systems
The performance of a local feature based system, using Gabor-filters, and a global template matching based system, using a combination of PCA (Principal Component Analysis) and LD...
Peter Kalocsai, Wenyi Zhao, Egor Elagin
APVIS
2006
14 years 11 months ago
Pattern puzzle: a metaphor for visualizing software complexity measures
Software systems have become increasingly complex over the years. Complexity metrics measures software complexity using real numbers. It is, however, hard to gain insight into dif...
Adam Ghandar, A. S. M. Sajeev, Xiaodi Huang
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 2 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
SIGADA
2004
Springer
15 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton