Sciweavers

1511 search results - page 195 / 303
» Active Risk Estimation
Sort
View
ISSS
1998
IEEE
103views Hardware» more  ISSS 1998»
14 years 9 days ago
False Path Analysis Based on a Hierarchical Control Representation
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
Apostolos A. Kountouris, Christophe Wolinski
PAM
2010
Springer
13 years 10 months ago
A Probabilistic Population Study of the Conficker-C Botnet
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
Rhiannon Weaver
LREC
2008
100views Education» more  LREC 2008»
13 years 9 months ago
How to Evaluate and Raise the Quality in a Collaborative Lexicographic Approach
This paper focuses on different aspects of collaborative work used to create the electronic version of a dictionary in paper format, edited and printed by the Romanian Academy dur...
Dan Cristea, Corina Forascu, Marius Raschip, Micha...
BMVC
1998
13 years 9 months ago
Gesture Recognition for Visually Mediated Interaction using Probabilistic Event Trajectories
An approach to gesture recognition is presented in which gestures are modelled probabilistically as sequences of visual events. These events are matched to visual input using prob...
Stephen J. McKenna, Shaogang Gong
GIR
2008
ACM
13 years 9 months ago
Evaluating field crisping methods for representing spatial prepositions
There is a need for GIR systems to interpret the vague aspects of spatial language. Here we describe an initial approach towards evaluating crisp realisations of a field-based mo...
Mark M. Hall, Christopher B. Jones