Sciweavers

640 search results - page 19 / 128
» Access Control for Active Spaces
Sort
View
ISBI
2004
IEEE
14 years 9 months ago
Controling The False Positive Detection Rate In Fuzzy Clustering of fMRI Data
Despite its potential advantages for fMRI analysis, fuzzy C-means (FCM) clustering suffers from limitations such as the need for a priori knowledge of the number of clusters, and ...
Hesamoddin Jahanian, Hamid Soltanian-Zadeh, Gholam...
WIAS
2010
98views more  WIAS 2010»
13 years 7 months ago
A multiagent architecture for controlling the Palamede satellite
The fundamental role of autonomous agents in managing activities of space systems has emerged some years ago with the NASA’s Remote Agent Experiment. However, the possible advant...
Francesco Amigoni, Stefano Gualandi, Daniele Menot...
ITC
1997
IEEE
123views Hardware» more  ITC 1997»
14 years 28 days ago
Modifying User-Defined Logic for Test Access to Embedded Cores
Testing embedded cores is a challenge because access to core I/Os is limited. The user-defined logic (ZJDL) surrounding the core may restrict the set of test vectors that can be a...
Bahram Pouya, Nur A. Touba
JSAC
2011
137views more  JSAC 2011»
12 years 11 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
BNCOD
2003
150views Database» more  BNCOD 2003»
13 years 10 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray