Sciweavers

1345 search results - page 248 / 269
» A Class of Logarithmic Integrals
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ICEIS
2009
IEEE
14 years 2 months ago
Semi-supervised Information Extraction from Variable-length Web-page Lists
We propose two methods for constructing automated programs for extraction of information from a class of web pages that are very common and of high practical significance - varia...
Daniel Nikovski, Alan Esenther, Akihiro Baba
ISMAR
2009
IEEE
14 years 2 months ago
Real-time in-situ visual feedback of task performance in mixed environments for learning joint psychomotor-cognitive tasks
This paper proposes an approach to mixed environment training of manual tasks requiring concurrent use of psychomotor and cognitive skills. To train concurrent use of both skill s...
Aaron Kotranza, D. Scott Lind, Carla M. Pugh, Benj...
COMPGEOM
2009
ACM
14 years 2 months ago
Epsilon nets and union complexity
We consider the following combinatorial problem: given a set of n objects (for example, disks in the plane, triangles), and an integer L ≥ 1, what is the size of the smallest su...
Kasturi R. Varadarajan
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
14 years 2 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou