Sciweavers

621 search results - page 99 / 125
» Functional and structural properties in the Model-Driven Eng...
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 6 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
NAR
2007
91views more  NAR 2007»
13 years 8 months ago
SuperHapten: a comprehensive database for small immunogenic compounds
The immune system protects organisms from foreign proteins, peptide epitopes and a multitude of chemical compounds. Among these, haptens are small molecules, eliciting an immune r...
Stefan Günther, Dorothea Hempel, Mathias Dunk...
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 8 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
IROS
2009
IEEE
152views Robotics» more  IROS 2009»
14 years 3 months ago
EMG-to-force estimation with full-scale physiology based muscle model
— EMG-to-force estimation for voluntary muscle contraction has many applications in human-machine interaction, motion analysis, and rehabilitation robotics for prosthetic limbs o...
Mitsuhiro Hayashibe, David Guiraud, Philippe Poign...
INFOCOM
2003
IEEE
14 years 1 months ago
Pseudo Likelihood Estimation in Network Tomography
Abstract— Network monitoring and diagnosis are key to improving network performance. The difficulties of performance monitoring lie in today’s fast growing Internet, accompani...
Gang Liang, Bin Yu