Sciweavers

3516 search results - page 653 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
120
Voted
PAMI
1998
141views more  PAMI 1998»
15 years 2 months ago
A Probabilistic Approach to the Coupled Reconstruction and Restoration of Underwater Acoustic Images
—This paper describes a probabilistic technique for the coupled reconstruction and restoration of underwater acoustic images. The technique is founded on the physics of the image...
Vittorio Murino, Andrea Trucco, Carlo S. Regazzoni
151
Voted
ESWA
2008
123views more  ESWA 2008»
15 years 1 months ago
Computing context-dependent temporal diagnosis in complex domains
Over the years, many Artificial Intelligence (AI) approaches have dealt with the diagnosis problem and its application in complex environments such as medical domains. Model-Based...
José M. Juárez, Manuel Campos, Jos&e...
127
Voted
DLOG
2007
15 years 5 months ago
Retrospective on Clio: Schema Mapping and Data Exchange in Practice
Clio is a joint research project between the University of Toronto and IBM Almaden Research Center started in 1999 to address both foundational and systems issues related to the ma...
Renée J. Miller
158
Voted
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 9 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
INFOCOM
2009
IEEE
15 years 9 months ago
Structured Admission Control Policy in Heterogeneous Wireless Networks with Mesh Underlay
—In this paper, we investigate into optimal admission control policies for Heterogeneous Wireless Networks (HWN), considering an integration of wireless mesh networks with an ove...
Amin Farbod, Ben Liang