Sciweavers

201 search results - page 12 / 41
» Data conflict resolution using trust mappings
Sort
View
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ASAP
1997
IEEE
144views Hardware» more  ASAP 1997»
13 years 12 months ago
Automatic data mapping of signal processing applications
This paper presents a technique to map automatically a complete digital signal processing (DSP) application onto a parallel machine with distributed memory. Unlike other applicati...
Corinne Ancourt, Denis Barthou, Christophe Guettie...
SOUPS
2009
ACM
14 years 2 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
MICCAI
2007
Springer
14 years 8 months ago
Customised Cytoarchitectonic Probability Maps Using Deformable Registration: Primary Auditory Cortex
A novel method is presented for creating a probability map from histologically defined cytoarchitectonic data, customised for the anatomy of individual fMRI volunteers. Postmortem ...
Lara Bailey, Purang Abolmaesumi, Julian Tam, Patri...
MVA
2000
249views Computer Vision» more  MVA 2000»
13 years 9 months ago
3D City Modeling with Laser Range Data and 2D Maps
Visualizations and simulations in an urban environment need 3D digital maps rather than traditional 2D maps, and constructing 3D maps from multiple data sources has become a promi...
Pingtao Wang, Takeshi Doihara, Kazuo Oda, Wei Lu