Sciweavers

558 search results - page 13 / 112
» Safe and Effective Determinant Evaluation
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
74
Voted
WSC
1997
15 years 1 months ago
Evaluation of a (R, s, Q, c) Multi-Item Inventory Replenishment Policy Through Simulation
In this paper, the case of a cardboard box marketing firm is studied and a (R,s,Q,c) inventory replenishment policy is proposed and evaluated by means of discrete event simulation...
Carlos B. Ramirez Cerda, Armando J. Espinosa de lo...
CVPR
1999
IEEE
16 years 1 months ago
Fundamental Bounds on Edge Detection: An Information Theoretic Evaluation of Different Edge Cues
We treat the problem of edge detection as one of statistical inference. Local edge cues, implemented by filters, provide information about the likely positions of edges which can ...
Scott Konishi, Alan L. Yuille, James M. Coughlan, ...
JIS
2007
129views more  JIS 2007»
14 years 11 months ago
Employing log metrics to evaluate search behaviour and success: case study BBC search engine
Argues that metrics can be generated from search transactional Web logs that can help evaluate search engine effectiveness. Search logs from the BBC Website were analysed and metr...
Paul Huntington, David Nicholas, Hamid R. Jamali M...
IROS
2007
IEEE
150views Robotics» more  IROS 2007»
15 years 6 months ago
Long-Term learning using multiple models for outdoor autonomous robot navigation
Abstract—Autonomous robot navigation in unstructured outdoor environments is a challenging area of active research. The navigation task requires identifying safe, traversable pat...
Michael J. Procopio, Jane Mulligan, Gregory Z. Gru...