Sciweavers

216 search results - page 30 / 44
» Modeling and Automated Containment of Worms
Sort
View
GIS
2003
ACM
14 years 8 months ago
A predictive location model for location-based services
Location-Based Services (LBSs) utilize information about users' locations through location-aware mobile devices to provide services, such as nearest features of interest, the...
Hassan A. Karimi, Xiong Liu
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
TMI
2002
259views more  TMI 2002»
13 years 7 months ago
3-D Active Appearance Models: Segmentation of Cardiac MR and Ultrasound Images
A model-based method for three-dimensional image segmentation was developed and its performance assessed in segmentation of volumetric cardiac magnetic resonance (MR) images and ec...
Steven C. Mitchell, Johan G. Bosch, Boudewijn P. F...
DAC
2003
ACM
14 years 8 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
DLOG
2007
13 years 10 months ago
Retrospective on Clio: Schema Mapping and Data Exchange in Practice
Clio is a joint research project between the University of Toronto and IBM Almaden Research Center started in 1999 to address both foundational and systems issues related to the ma...
Renée J. Miller