Sciweavers

156 search results - page 15 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
HT
2007
ACM
13 years 11 months ago
Identifying subcommunities using cohesive subgroups in social hypertext
Web pages can be modeled as nodes in a social network, and hyperlinks between pages form links (relationships) between the nodes. Links may take the form of comments, for example ...
Alvin Chin, Mark H. Chignell
PCM
2004
Springer
127views Multimedia» more  PCM 2004»
14 years 27 days ago
Using a Non-prior Training Active Feature Model
This paper presents a feature point tracking algorithm using optical flow under the non-prior training active feature model (NPTAFM) framework. The proposed algorithm mainly focus...
Sangjin Kim, Jinyoung Kang, Jeongho Shin, Seongwon...
VTS
2007
IEEE
116views Hardware» more  VTS 2007»
14 years 1 months ago
Case Study: Soft Error Rate Analysis in Storage Systems
Soft errors due to cosmic particles are a growing reliability threat for VLSI systems. In this paper we analyze the soft error vulnerability of FPGAs used in storage systems. Sinc...
Brian Mullins, Hossein Asadi, Mehdi Baradaran Taho...
ENVSOFT
2010
100views more  ENVSOFT 2010»
13 years 7 months ago
Coupled urban wind flow and indoor natural ventilation modelling on a high-resolution grid: A case study for the Amsterdam ArenA
Wind flow in urban environments is an important factor governing the dispersion of heat and pollutants from streets, squares and buildings. This paper presents a coupled CFD model...
T. van Hooff, B. Blocken
SIMUTOOLS
2008
13 years 9 months ago
MARTE: a profile for RT/E systems modeling, analysis--and simulation?
As its name promises, the Unified Modeling Language (UML) provides a collection of diagrammatic modeling styles. To the early class/objects and use-case diagrams were almost immed...
Frédéric Mallet, Robert de Simone