Sciweavers

341 search results - page 58 / 69
» On Stochastic Modeling for Integrated Security and Dependabi...
Sort
View
APVIS
2009
14 years 10 months ago
Visualizing diffusion tensor imaging data with merging ellipsoids
Diffusion tensor fields reveal the underlying anatomical structures in biological tissues such as neural fibers in the brain. Most current methods for visualizing the diffusion te...
Wei Chen, Song Zhang, Stephen Correia, David F. Ta...
UML
2005
Springer
15 years 3 months ago
Reliability Prediction in Model-Driven Development
Abstract. Evaluating the implications of an architecture design early in the software development lifecycle is important in order to reduce costs of development. Reliability is an ...
Genaína Nunes Rodrigues, David S. Rosenblum...
CIKM
2007
Springer
15 years 1 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
CCS
2007
ACM
15 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
INFOCOM
2005
IEEE
15 years 3 months ago
BARD: Bayesian-assisted resource discovery in sensor networks
Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the mos...
Fred Stann, John S. Heidemann