Sciweavers

144 search results - page 17 / 29
» re 2008
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 10 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
ICPR
2008
IEEE
14 years 9 months ago
Detecting and ordering salient regions for efficient browsing
We describe an ensemble approach to learning1 salient regions from data partitioned according to the2 distributed processing requirements of large-scale sim-3 ulations. The volume...
Larry Shoemaker, Robert E. Banfield, Larry O. Hall...
RTAS
2008
IEEE
14 years 3 months ago
Modular Code Generation from Triggered and Timed Block Diagrams
In previous work we have shown how modular code can be automatically generated from a synchronous block diagram notation where all blocks fire at all times. Here, we extend this ...
Roberto Lublinerman, Stavros Tripakis
CIKM
2008
Springer
13 years 10 months ago
Linear time membership in a class of regular expressions with interleaving and counting
The extension of Regular Expressions (REs) with an interleaving (shuffle) operator has been proposed in many occasions, since it would be crucial to deal with unordered data. Howe...
Giorgio Ghelli, Dario Colazzo, Carlo Sartiani
CTW
2007
95views more  CTW 2007»
13 years 8 months ago
Sensemaking, safety, and cooperative work in the intensive care unit
Abstract Making sense of circumstances and situations is critical to coordinate cooperative work. Especially in process control domains, we may expect that effective and reliable o...
Sara Albolino, Richard Cook, Michael O'Connor