Sciweavers

10797 search results - page 1933 / 2160
» Robust control applications
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ICLP
1997
Springer
15 years 8 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...
SIGGRAPH
1996
ACM
15 years 8 months ago
Efficient Generation of Motion Transitions Using Spacetime Constraints
This paper describesthe application of spacetime constraints to creating transitions between segments of human body motion. The motion transition generation uses a combination of ...
Charles Rose, Brian K. Guenter, Bobby Bodenheimer,...
NN
1997
Springer
174views Neural Networks» more  NN 1997»
15 years 8 months ago
Learning Dynamic Bayesian Networks
Bayesian networks are directed acyclic graphs that represent dependencies between variables in a probabilistic model. Many time series models, including the hidden Markov models (H...
Zoubin Ghahramani
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
15 years 8 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
« Prev « First page 1933 / 2160 Last » Next »