Sciweavers

4564 search results - page 742 / 913
» Data Integration Using ID-Logic
Sort
View
ACMSE
2007
ACM
14 years 2 months ago
A self-testing autonomic container
Many strategies have been proposed to address the problems associated with managing increasingly complex computing systems. IBM's Autonomic Computing (AC) paradigm is one suc...
Ronald Stevens, Brittany Parsons, Tariq M. King
CIDM
2007
IEEE
14 years 2 months ago
Designing a Fuzzy Rule Based System to Estimate Depth of Anesthesia
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
14 years 2 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
3DPVT
2004
IEEE
141views Visualization» more  3DPVT 2004»
14 years 2 months ago
Exploitation of 3D Images for Face Authentication Under Pose and Illumination Variations
An appearance-based face authentication system integrating 2D color or intensity images and 3D data is presented in this paper. The proposed system is based on a low-cost 3D and c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
CAV
2006
Springer
116views Hardware» more  CAV 2006»
14 years 2 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...