Sciweavers

1534 search results - page 263 / 307
» Error Reporting Logic
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 9 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
CORR
2004
Springer
140views Education» more  CORR 2004»
13 years 9 months ago
Checking modes of HAL programs
Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generatio...
Maria J. García de la Banda, Warwick Harvey...
TCAD
2002
115views more  TCAD 2002»
13 years 9 months ago
Analytical models for crosstalk excitation and propagation in VLSI circuits
We develop a general methodology to analyze crosstalk effects that are likely to cause errors in deep submicron high speed circuits. We focus on crosstalk due to capacitive coupli...
Wei-Yu Chen, Sandeep K. Gupta, Melvin A. Breuer
TMI
2002
185views more  TMI 2002»
13 years 9 months ago
A modified fuzzy c-means algorithm for bias field estimation and segmentation of MRI data
In this paper, we present a novel algorithm for fuzzy segmentation of magnetic resonance imaging (MRI) data and estimation of intensity inhomogeneities using fuzzy logic. MRI inten...
Mohamed N. Ahmed, Sameh M. Yamany, Nevin Mohamed, ...
NAACL
2010
13 years 7 months ago
Joint Inference for Knowledge Extraction from Biomedical Literature
Knowledge extraction from online repositories such as PubMed holds the promise of dramatically speeding up biomedical research and drug design. After initially focusing on recogni...
Hoifung Poon, Lucy Vanderwende