Sciweavers

19832 search results - page 3866 / 3967
» The Korrontea Data Modeling
Sort
View
TCS
2008
15 years 1 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
AUTOMATICA
2005
112views more  AUTOMATICA 2005»
15 years 1 months ago
Robust maximum-likelihood estimation of multivariable dynamic systems
This paper examines the problem of estimating linear time-invariant state-space system models. In particular it addresses the parametrization and numerical robustness concerns tha...
Stuart Gibson, Brett Ninness
ISCI
2007
135views more  ISCI 2007»
15 years 1 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
TIP
2008
86views more  TIP 2008»
15 years 1 months ago
Learning the Dynamics and Time-Recursive Boundary Detection of Deformable Objects
We propose a principled framework for recursively segmenting deformable objects across a sequence of frames. We demonstrate the usefulness of this method on left ventricular segmen...
Walter Sun, Müjdat Çetin, Raymond C. C...
IVS
2007
130views more  IVS 2007»
15 years 1 months ago
A design framework for exploratory geovisualization in epidemiology
This paper presents a design framework for geographic visualization based on iterative evaluations of a toolkit designed to support cancer epidemiology. The Exploratory Spatio-Tem...
Anthony C. Robinson
« Prev « First page 3866 / 3967 Last » Next »