Sciweavers

2259 search results - page 210 / 452
» Separation and information hiding
Sort
View
IEEECIT
2010
IEEE
13 years 9 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
SAB
2010
Springer
156views Optimization» more  SAB 2010»
13 years 9 months ago
Attentional Mechanisms for Lateral Line Sensing through Spectral Analysis
Abstract. For autonomy in underwater robotics it is essential to develop context-driven controllers, capable of leading from perception to action without human intervention. One of...
Otar Akanyeti, Maria-Camilla Fiazza, Paolo Fiorini
EMNLP
2009
13 years 8 months ago
A Bayesian Model of Syntax-Directed Tree to String Grammar Induction
Tree based translation models are a compelling means of integrating linguistic information into machine translation. Syntax can inform lexical selection and reordering choices and...
Trevor Cohn, Phil Blunsom
FAST
2009
13 years 8 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
ICIP
2009
IEEE
13 years 8 months ago
Object detection and tracking for night surveillance based on salient contrast analysis
Night surveillance is a challenging task because of low brightness, low contrast, low Signal to Noise Ratio (SNR) and low appearance information. Most existing models for night su...
Liangsheng Wang, Kaiqi Huang, Yongzhen Huang, Tien...