Sciweavers

606 search results - page 66 / 122
» Capturing the Intention of Model Changes
Sort
View
CCS
2007
ACM
14 years 3 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
BMCBI
2011
13 years 21 days ago
A Beta-Mixture Model for Dimensionality Reduction, Sample Classification and Analysis
Background: Patterns of genome-wide methylation vary between tissue types. For example, cancer tissue shows markedly different patterns from those of normal tissue. In this paper ...
Kirsti Laurila, Bodil Oster, Claus L. Andersen, Ph...
ISR
2010
13 years 7 months ago
Electronic Markets, Search Costs, and Firm Boundaries
We study how electronic markets that facilitate broader inter-firm transactions affect the vertical scope of emerging IT-enabled extended enterprises. We do so by modeling firms...
Ramesh Sankaranarayanan, Arun Sundararajan
VMV
2001
131views Visualization» more  VMV 2001»
13 years 10 months ago
Shape Model and Threshold Extraction via Shape Gradients
Shape information is utilized by numerous applications in computer vision, scientific visualization and computer graphics. This paper presents a novel algorithm for exploring and ...
Roger C. Tam, Alain Fournier
ICCD
2006
IEEE
104views Hardware» more  ICCD 2006»
14 years 6 months ago
Guiding Architectural SRAM Models
— Caches, block memories, predictors, state tables, and other forms of on-chip memory are continuing to consume a greater portion of processor designs with each passing year. Mak...
Banit Agrawal, Timothy Sherwood