Sciweavers

2501 search results - page 426 / 501
» Semiotics and Intelligent Control
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 28 days ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ICCAD
1994
IEEE
105views Hardware» more  ICCAD 1994»
14 years 27 days ago
Register assignment through resource classification for ASIP microcode generation
Application Specific Instruction-Set Processors (ASIPs) offer designers the ability for high-speed data and control processing with the added flexibility needed for late design sp...
Clifford Liem, Trevor C. May, Pierre G. Paulin
SUTC
2010
IEEE
14 years 19 days ago
A Log-Ratio Information Measure for Stochastic Sensor Management
—In distributed sensor networks, computational and energy resources are in general limited. Therefore, an intelligent selection of sensors for measurements is of great importance...
Daniel Lyons, Benjamin Noack, Uwe D. Hanebeck
GECCO
2007
Springer
215views Optimization» more  GECCO 2007»
14 years 19 days ago
Finding safety errors with ACO
Model Checking is a well-known and fully automatic technique for checking software properties, usually given as temporal logic formulae on the program variables. Most model checke...
Enrique Alba, J. Francisco Chicano
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
14 years 19 days ago
Genetic evolution of hierarchical behavior structures
The development of coherent and dynamic behaviors for mobile robots is an exceedingly complex endeavor ruled by task objectives, environmental dynamics and the interactions within...
Brian G. Woolley, Gilbert L. Peterson