Sciweavers

956 search results - page 159 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
ICICS
2005
Springer
14 years 3 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
APIN
1998
107views more  APIN 1998»
13 years 10 months ago
Multiple Adaptive Agents for Tactical Driving
Abstract. Recent research in automated highway systems has ranged from low-level vision-based controllers to high-level route-guidance software. However, there is currently no syst...
Rahul Sukthankar, Shumeet Baluja, John Hancock
IADIS
2003
13 years 11 months ago
Towards a Distributed Information Architecture for Avionics Data
Avionics data at the National Aeronautics and Space Administration’s (NASA) Jet Propulsion Laboratory (JPL) consists of distributed, unmanaged, and heterogeneous information tha...
Chris Mattmann, Dana Freeborn, Daniel J. Crichton
IMAGING
2003
13 years 11 months ago
Group Theoretical Invariants in Color Image Processing
Many image formation processes are complex interactions of several sub-processes and the analysis of the resulting images requires often to separate the influence of these sub-pr...
Reiner Lenz, Linh Viet Tran, Thanh Hai Bui
ACL
1992
13 years 11 months ago
Estimating Upper and Lower Bounds on the Performance of Word-Sense Disambiguation Programs
We have recently reported on two new word-sense disambiguation systems, one trained on bilingual material (the Canadian Hansards) and the other trained on monolingual material (Ro...
William A. Gale, Kenneth Ward Church, David Yarows...