Sciweavers

17920 search results - page 3575 / 3584
» Recentering computer science
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
TITB
2010
120views Education» more  TITB 2010»
13 years 4 months ago
A distributed, collaborative intelligent agent system approach for proactive postmarketing drug safety surveillance
Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance prim...
Yanqing Ji, Hao Ying, Margo S. Farber, John Yen, P...
TMI
2010
217views more  TMI 2010»
13 years 4 months ago
A Generative Model for Image Segmentation Based on Label Fusion
We propose a nonparametric, probabilistic model for the automatic segmentation of medical images, given a training set of images and corresponding label maps. The resulting inferen...
Mert R. Sabuncu, B. T. Thomas Yeo, Koenraad Van Le...
TMM
2010
149views Management» more  TMM 2010»
13 years 4 months ago
Joint Compressive Video Coding and Analysis
Traditionally, video acquisition, coding and analysis have been designed and optimized as independent tasks. This has a negative impact in terms of consumed resources, as most of ...
M. Cossalter, Giuseppe Valenzise, Marco Tagliasacc...
TWC
2010
13 years 4 months ago
Robustness analysis and new hybrid algorithm of wideband source localization for acoustic sensor networks
Wideband source localization using acoustic sensor networks has been drawing a lot of research interest recently in wireless communication applications, such as cellular handset lo...
Kun Yan, Hsiao-Chun Wu, S. Sitharama Iyengar
« Prev « First page 3575 / 3584 Last » Next »