Sciweavers

1406 search results - page 41 / 282
» Information Flow in Systems with Schedulers
Sort
View
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 8 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
DICTA
2009
13 years 8 months ago
Improved Simultaneous Computation of Motion Detection and Optical Flow for Object Tracking
Abstract--Object tracking systems require accurate segmentation of the objects from the background for effective tracking. Motion segmentation or optical flow can be used to segmen...
Simon Denman, Clinton Fookes, Sridha Sridharan
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
13 years 2 months ago
A simple optimal power flow model with energy storage
The integration of renewable energy generation, such as wind power, into the electric grid is difficult because of the source intermittency and the large distance between generatio...
K. Mani Chandy, Steven H. Low, Ufuk Topcu, Huan Xu
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober