Sciweavers

1837 search results - page 255 / 368
» Abstraction and the C Machine Model
Sort
View
SAC
2010
ACM
13 years 3 months ago
A new methodology for photometric validation in vehicles visual interactive systems
This work proposes a new methodology for automatically validating the internal lighting system of an automotive, i.e., assessing the visual quality of an instrument cluster (IC) f...
Alexandre W. C. Faria, David Menotti, Daniel S. D....
FUIN
2011
358views Cryptology» more  FUIN 2011»
13 years 16 days ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
SIGMOD
2011
ACM
158views Database» more  SIGMOD 2011»
12 years 12 months ago
Workload-aware database monitoring and consolidation
In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 producti...
Carlo Curino, Evan P. C. Jones, Samuel Madden, Har...
CP
2004
Springer
14 years 2 months ago
Leveraging the Learning Power of Examples in Automated Constraint Acquisition
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
Christian Bessière, Remi Coletta, Eugene C....
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson