Sciweavers

3281 search results - page 518 / 657
» An Approach to use Executable Models for Testing
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
ICMCS
2007
IEEE
143views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Hidden Conditional Random Fields for Meeting Segmentation
Automatic segmentation and classification of recorded meetings provides a basis towards understanding the content of a meeting. It enables effective browsing and querying in a me...
Stephan Reiter, Björn Schuller, Gerhard Rigol...
IEAAIE
2010
Springer
13 years 7 months ago
Down-Up-Down Behavior Generation for Interactive Robots
Behavior generation in humans and animals usually employs a combination of bottom-up and top-down patterns. Most available robotic architectures utilize either bottom-up or top-dow...
Yasser F. O. Mohammad, Toyoaki Nishida
ACL
2011
13 years 21 days ago
Event Extraction as Dependency Parsing
Nested event structures are a common occurrence in both open domain and domain specific extraction tasks, e.g., a “crime” event can cause a “investigation” event, which c...
David McClosky, Mihai Surdeanu, Christopher D. Man...
DATE
2009
IEEE
127views Hardware» more  DATE 2009»
14 years 3 months ago
Process variation aware thread mapping for Chip Multiprocessors
Abstract—With the increasing scaling of manufacturing technology, process variation is a phenomenon that has become more prevalent. As a result, in the context of Chip Multiproce...
Shengyan Hong, Sri Hari Krishna Narayanan, Mahmut ...