Sciweavers

19003 search results - page 183 / 3801
» We Need Assurance!
Sort
View
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 4 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
ISBI
2007
IEEE
14 years 4 months ago
Harp Tracking Refinement Using Seeded Region Growing
Tagged magnetic resonance (MR) imaging makes it possible to image the motion of tissues such as the muscles found in the heart and tongue. The harmonic phase (HARP) method largely...
Xiaofeng Liu, Emi Murano, Maureen C. Stone, Jerry ...
CSFW
2006
IEEE
14 years 4 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers
GMP
2006
IEEE
14 years 4 months ago
Surface Creation and Curve Deformations Between Two Complex Closed Spatial Spline Curves
Abstract. This paper presents an algorithm to generate a smooth surface between two closed spatial spline curves. With the assumption that the two input curves can be projected to ...
Joel Daniels II, Elaine Cohen
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 4 months ago
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection
Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability ...
Thomas M. Galla, Karin Anna Hummel, Burkhard Peer