Search For:

Displaying 1-10 out of 10 total
QLISP - A language for the interactive development of complex systems
Found in: Managing Requirements Knowledge, International Workshop on
By Earl D. Sacerdoti, Richard E. Fikes, Rene Reboh, Daniel Sagalowicz, Richard J. Waldinger, B. Michael Wilber
Issue Date:June 1976
pp. 349
No summary available.
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes
Found in: IEEE Transactions on Software Engineering
By Michael A. Schumann,Doron Drusinsky,James B. Michael,Duminda Wijesekera
Issue Date:February 2014
pp. 154-166
This paper presents a novel application of computer-assisted formal methods for systematically specifying, documenting, statically and dynamically checking, and maintaining human-centered workflow processes. This approach provides for end-to-end verificati...
Metrics for Measuring the Effectiveness of Software-Testing Tools
Found in: Software Reliability Engineering, International Symposium on
By James B. Michael, Bernard J. Bossuyt, Byron B. Snyder
Issue Date:November 2002
pp. 117
The levels of quality, maintainability, testability, and stability of software can be improved and measured through the use of automated testing tools throughout the software development process. Automated testing tools assist software engineers to gauge t...
Bayesian Estimation of Smooth Parameter Maps for Dynamic Contrast-Enhanced MR Images with Block-ICM
Found in: Computer Vision and Pattern Recognition Workshop
By B. Michael Kelm, Natalie Mueller, Bjoern H. Menze, Fred A. Hamprecht
Issue Date:June 2006
pp. 96
In cancer, pathological tissue often exhibits abnormal perfusion and vascular permeability. These can be estimated by monitoring the abundance of an injected contrast medium over time, using Dynamic Contrast-Enhanced (DCE) MR Imaging. The resulting spatial...
Thoughts on Higher Education and Scientific Research
Found in: IT Professional
By J Voas,G F Hurlburt,K W Miller,P A Laplante,B Michael
Issue Date:March 2011
pp. 6-9
The notion of a
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning
Found in: Pattern Recognition, International Conference on
By B. Michael Kelm, Chris Pal, Andrew McCallum
Issue Date:August 2006
pp. 828-832
It is possible to broadly characterize two approaches to probabilistic modeling in terms of generative and discriminative methods. Provided with sufficient training data the discriminative approach is expected to yield superior accuracy as compared to the ...
Homeland Security's Cyber Component: A Survey of Legal Issues
Found in: Computer Software and Applications Conference, Annual International
By James B. Michael, Thomas C. Wingfield, Steven E. Roberts
Issue Date:November 2003
pp. 24
In this panel we discuss the legal developments related to the cyber aspects of homeland security. Through analysis of statutes, Executive Orders, and case studies, we highlight the rapid development of a new body of law and its consequences for the govern...
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System
Found in: Computer Software and Applications Conference, Annual International
By James B. Michael, Thomas C. Wingfield, Duminda Wijesekera
Issue Date:November 2003
pp. 621
In this paper we address the development of measured responses to coercive actions. We demonstrate, via a case study of kinetic and cyber attacks on a safety-critical software-intensive system, the application of the Schmitt Analysis to the question of whe...
From Chaos to Collective Defense
Found in: Computer
By James B. Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield
Issue Date:August 2010
pp. 91-94
Deterrence, civil defense, collective defense, and arms control were key national security doctrines in the 20th century, and they are being reevaluated now for application to cyberspace.
Integrating Legal and Policy Factors in Cyberpreparedness
Found in: Computer
By James B. Michael, John F. Sarkesain, Thomas C. Wingfield, Georgios Dementis, Gonçalo Nuno Baptista Sousa
Issue Date:April 2010
pp. 90-92
Cyberwarfare countermeasures must consider more than technological capabilities.