Sciweavers

254 search results - page 34 / 51
» A User Modeling Approach to Determining System Initiative in...
Sort
View
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
EUMAS
2006
13 years 9 months ago
Agent Capability: Automating the Design to Code Process
Current IT application domains such as web services and autonomic computing call for highly flexible systems, able to automatically adapt to changing operational environments as w...
Loris Penserini, Anna Perini, Angelo Susi, John My...
SIAMAM
2000
100views more  SIAMAM 2000»
13 years 7 months ago
Phase Transition Near a Liquid-Gas Coexistence Equilibrium
Effects of small perturbations from a liquid-gas coexistence equilibrium (the Maxwell states) is studied for an isothermal (or isentropic) gas-liquid phase transition in a sealed o...
Xiao-Ping Wang, Xinfu Chen
CVPR
2004
IEEE
14 years 9 months ago
A Unified Framework for Uncertainty Propagation in Automatic Shape Tracking
Uncertainty handling plays an important role during shape tracking. We have recently shown that the fusion of measurement information with system dynamics and shape priors greatly...
Xiang Sean Zhou, Dorin Comaniciu, Binglong Xie, R....
CONTEXT
2001
Springer
14 years 5 days ago
WordSieve: A Method for Real-Time Context Extraction
Abstract. In order to be useful, intelligent information retrieval agents must provide their users with context-relevant information. This paper presents WordSieve, an algorithm fo...
Travis Bauer, David B. Leake