Sciweavers

12334 search results - page 172 / 2467
» The Use of C
Sort
View
ACSAC
2000
IEEE
15 years 9 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
WSC
2007
15 years 6 months ago
Using flexible points in a developing simulation of selective dissolution in alloys
Coercion is a semi-automated simulation adaptation technology that uses subject-matter expert insight about model ion alternatives, called flexible points, to change the behavior...
Joseph C. Carnahan, Steven A. Policastro, Erin C. ...
CORR
2007
Springer
158views Education» more  CORR 2007»
15 years 4 months ago
Model of Electrostatic Actuated Deformable Mirror Using Strongly Coupled Electro-Mechanical Finite Element
The aim of this paper is to deal with multi-physics simulation of micro-electro-mechanical systems (MEMS) based on an advanced numerical methodology. MEMS are very small devices i...
V. Rochus, J.-C. Golinval, C. Louis, C. Mendez, I....
ICPR
2000
IEEE
16 years 5 months ago
Segmentation of Bone Tumor in MR Perfusion Images Using Neural Networks and Multiscale Pharmacokinetic Features
The decrease in the volume of viable tumor is an indicator for the effect preoperative chemotherapy has on bone tumors. We develop an approach for segmenting dynamic perfusionMR-i...
Michael Egmont-Petersen, Alejandro F. Frangi, Wiro...
DAC
2001
ACM
16 years 5 months ago
Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores
Crosstalk effects degrade the integrity of signals traveling on long interconnects and must be addressed during manufacturing testing. External testing for crosstalk is expensive ...
Li Chen, Xiaoliang Bai, Sujit Dey