Sciweavers

21490 search results - page 4193 / 4298
» Business Process Modeling
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 4 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
LION
2007
Springer
192views Optimization» more  LION 2007»
14 years 4 months ago
Learning While Optimizing an Unknown Fitness Surface
This paper is about Reinforcement Learning (RL) applied to online parameter tuning in Stochastic Local Search (SLS) methods. In particular a novel application of RL is considered i...
Roberto Battiti, Mauro Brunato, Paolo Campigotto
LOCA
2007
Springer
14 years 4 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
OOPSLA
2007
Springer
14 years 4 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
OOPSLA
2007
Springer
14 years 4 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
« Prev « First page 4193 / 4298 Last » Next »