Sciweavers

292 search results - page 22 / 59
» Inference and enforcement of data structure consistency spec...
Sort
View
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
AAAI
1994
13 years 9 months ago
The Ups and Downs of Lexical Acquisition
We have implemented an incremental lexical acquisition mechanism that learns the meanings of previously unknown words from the context in which they appear, as a part of the proce...
Peter M. Hastings, Steven L. Lytinen
BMCBI
2006
143views more  BMCBI 2006»
13 years 7 months ago
IsoSVM - Distinguishing isoforms and paralogs on the protein level
Background: Recent progress in cDNA and EST sequencing is yielding a deluge of sequence data. Like database search results and proteome databases, this data gives rise to inferred...
Michael Spitzer, Stefan Lorkowski, Paul Cullen, Al...
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
14 years 17 days ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
AAAI
2004
13 years 9 months ago
Reconstruction of 3D Models from Intensity Images and Partial Depth
This paper addresses the probabilistic inference of geometric structures from images. Specifically, of synthesizing range data to enhance the reconstruction of a 3D model of an in...
Luz Abril Torres-Méndez, Gregory Dudek