Sciweavers

2117 search results - page 277 / 424
» A Metadata Model for Capturing Presentations
Sort
View
143
Voted
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 8 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 8 months ago
Interactive query refinement
We investigate the problem of refining SQL queries to satisfy cardinality constraints on the query result. This has applications to the many/few answers problems often faced by da...
Chaitanya Mishra, Nick Koudas
132
Voted
AMDO
2006
Springer
15 years 8 months ago
Ballistic Hand Movements
Common movements like reaching, striking, etc. observed during surveillance have highly variable target locations. This puts appearance-based techniques at a disadvantage for model...
Shiv Naga Prasad Vitaladevuni, Vili Kellokumpu, La...
ATAL
2006
Springer
15 years 8 months ago
Rule value reinforcement learning for cognitive agents
RVRL (Rule Value Reinforcement Learning) is a new algorithm which extends an existing learning framework that models the environment of a situated agent using a probabilistic rule...
Christopher Child, Kostas Stathis
CLUSTER
2004
IEEE
15 years 8 months ago
Bandwidth-aware co-allocating meta-schedulers for mini-grid architectures
The interaction of simultaneously co-allocated jobs can often create contention in the network infrastructure of a dedicated computational grid. This contention can lead to degrad...
William M. Jones, Louis W. Pang, Walter B. Ligon I...