Sciweavers

133 search results - page 22 / 27
» Applying dependability aspects on top of
Sort
View
CCR
2004
151views more  CCR 2004»
13 years 7 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
TSE
2010
120views more  TSE 2010»
13 years 5 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
PUC
2010
205views more  PUC 2010»
13 years 2 months ago
A database-based framework for gesture recognition
Abstract Gestures are an important modality for human-machine communication. Computer vision modules performing gesture recognition can be important components of intelligent homes...
Vassilis Athitsos, Haijing Wang, Alexandra Stefan
SDM
2012
SIAM
261views Data Mining» more  SDM 2012»
11 years 9 months ago
Combining Active Learning and Dynamic Dimensionality Reduction
To date, many active learning techniques have been developed for acquiring labels when training data is limited. However, an important aspect of the problem has often been neglect...
Mustafa Bilgic
SDM
2009
SIAM
170views Data Mining» more  SDM 2009»
14 years 4 months ago
Optimal Distance Bounds on Time-Series Data.
Most data mining operations include an integral search component at their core. For example, the performance of similarity search or classification based on Nearest Neighbors is ...
Michail Vlachos, Philip S. Yu, Suleyman S. Kozat