Sciweavers

3179 search results - page 259 / 636
» Applications of PCF Theory
Sort
View
84
Voted
ESANN
2004
15 years 2 months ago
Forbidden Magnification? I
This paper presents some interesting results obtained by the algorithm by Bauer, Der and Hermann (BDH) [1] for magnification control in Self-Organizing Maps. Magnification control ...
Abha Jain, Erzsébet Merényi
111
Voted
DIMVA
2006
15 years 2 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
APVIS
2003
15 years 2 months ago
A Unified Taxonomic Framework for Information Visualization
© We present a taxonomy for Information Visualization (IV) that characterizes it in terms of data, task, skill and context, as well as a number of dimensions that relate to the in...
Darius Pfitzner, Vaughan Hobbs, David M. W. Powers
UAI
2001
15 years 2 months ago
Iterative Markov Chain Monte Carlo Computation of Reference Priors and Minimax Risk
We present an iterative Markov chain Monte Carlo algorithm for computing reference priors and minimax risk for general parametric families. Our approach uses MCMC techniques based...
John D. Lafferty, Larry A. Wasserman
116
Voted
WOA
2003
15 years 2 months ago
Towards the Improvement of Monitoring and Control Agencies through Knowledge-Based Approaches
Abstract—This paper illustrates how the functionalities of monitoring/control systems, within an agent–based framework, can be improved by the adoption of Knowledge–Based tec...
Matteo Palmonari, Fabio Sartori