Sciweavers

1995 search results - page 283 / 399
» Belief in Information Flow
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 11 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
CAISE
2010
Springer
13 years 11 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ETM
2010
257views Economy» more  ETM 2010»
13 years 11 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
CSREASAM
2009
13 years 11 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
CVIU
2006
110views more  CVIU 2006»
13 years 10 months ago
Viewpoint invariant exemplar-based 3D human tracking
This paper proposes a clustered exemplar-based model for performing viewpoint invariant tracking of the 3D motion of a human subject from a single camera. Each exemplar is associa...
Eng-Jon Ong, Antonio S. Micilotta, Richard Bowden,...