Sciweavers

537 search results - page 78 / 108
» Accountability and automation bias
Sort
View
IEEECIT
2009
IEEE
14 years 3 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
ISORC
2009
IEEE
14 years 3 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
TPHOL
2009
IEEE
14 years 3 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
FIMH
2009
Springer
14 years 3 months ago
Maximum Likelihood Motion Estimation in 3D Echocardiography through Non-rigid Registration in Spherical Coordinates
Automated motion tracking of the myocardium from 3D echocardiography provides insight into heart’s architecture and function. We present a method for 3D cardiac motion tracking u...
Andriy Myronenko, Xubo B. Song, David J. Sahn
LPNMR
2009
Springer
14 years 3 months ago
A Default Approach to Semantics of Logic Programs with Constraint Atoms
We define the semantics of logic programs with (abstract) constraint atoms in a way closely tied to default logic. Like default logic, formulas in rules are evaluated using the cl...
Yi-Dong Shen, Jia-Huai You