Sciweavers

3104 search results - page 283 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
179
Voted
MICCAI
2009
Springer
16 years 6 months ago
Biomechanically-Constrained 4D Estimation of Myocardial Motion
We propose a method for the analysis of Magnetic Resonance (MR) cardiac images with the goal of reconstructing the motion of the ventricular walls. The main feature of our method i...
Hari Sundar, Christos Davatzikos, George Biros
DAC
2009
ACM
16 years 6 months ago
Context-sensitive timing analysis of Esterel programs
Traditionally, synchronous languages, such as Esterel, have been compiled into hardware, where timing analysis is relatively easy. When compiled into software ? e.g., into sequent...
Lei Ju, Bach Khoa Huynh, Samarjit Chakraborty, Abh...
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 10 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
149
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 11 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 11 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...