Sciweavers

5451 search results - page 1083 / 1091
» On very high degrees
Sort
View
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 3 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
WWW
2011
ACM
13 years 3 months ago
Two-stream indexing for spoken web search
This paper presents two-stream processing of audio to index the audio content for Spoken Web search. The first stream indexes the meta-data associated with a particular audio doc...
Jitendra Ajmera, Anupam Joshi, Sougata Mukherjea, ...
CVPR
2011
IEEE
13 years 10 days ago
Learning-based Hypothesis Fusion for Robust Catheter Tracking in 2D X-ray Fluoroscopy
Catheter tracking has become more and more important in recent interventional applications. It provides real time guidance for the physicians and can be used as motion compensated...
Wen Wu, Terrence Chen, Adrian Barbu, Peng Wang, No...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 9 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
BMCBI
2011
13 years 6 days ago
The Proteogenomic Mapping Tool
Background: High-throughput mass spectrometry (MS) proteomics data is increasingly being used to complement traditional structural genome annotation methods. To keep pace with the...
William S. Sanders, Nan Wang, Susan M. Bridges, Br...
« Prev « First page 1083 / 1091 Last » Next »