Sciweavers

4241 search results - page 816 / 849
» A Knowledge-Based Software Information System
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
ARCS
2005
Springer
14 years 2 months ago
Adaptive Object Acquisition
We propose an active vision system for object acquisition. The core of our approach is a reinforcement learning module which learns a strategy to scan an object. The agent moves a...
Gabriele Peters, Claus-Peter Alberts, Markus Bries...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
ICWE
2005
Springer
14 years 2 months ago
Modelling the Behaviour of Web Applications with ArgoUWE
A methodology needs to be empowered by appropriate tool support. The CASE tool ArgoUWE supports designers in the use of the UWE methodology for the systematic, UML-based developmen...
Alexander Knapp, Nora Koch, Gefei Zhang
LCPC
2005
Springer
14 years 2 months ago
Manipulating MAXLIVE for Spill-Free Register Allocation
Abstract. Many embedded systems use single-chip microcontrollers which have no on-chip RAM. In such a system, the processor registers must hold all live data values. Nanocontroller...
Shashi Deepa Arcot, Henry G. Dietz, Sarojini Priya...