Sciweavers

1416 search results - page 58 / 284
» An Exact Interpretation of While
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 8 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
IVA
2010
Springer
13 years 8 months ago
Multimodal Backchannels for Embodied Conversational Agents
One of the most desirable characteristics of an Embodied Conversational Agent (ECA) is the capability of interacting with users in a human-like manner. While listening to a user, a...
Elisabetta Bevacqua, Sathish Pammi, Sylwia Julia H...
ICML
2000
IEEE
14 years 10 months ago
Duality and Geometry in SVM Classifiers
We develop an intuitive geometric interpretation of the standard support vector machine (SVM) for classification of both linearly separable and inseparable data and provide a rigo...
Kristin P. Bennett, Erin J. Bredensteiner
ICSE
2009
IEEE-ACM
14 years 10 months ago
A toolset for automated failure analysis
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Fabrizio Pastore, Leonardo Mariani, Mauro Pezz&egr...
KDD
2009
ACM
208views Data Mining» more  KDD 2009»
14 years 10 months ago
A principled and flexible framework for finding alternative clusterings
The aim of data mining is to find novel and actionable insights in data. However, most algorithms typically just find a single (possibly non-novel/actionable) interpretation of th...
Zijie Qi, Ian Davidson