Sciweavers

4007 search results - page 304 / 802
» Computation with imprecise probabilities
Sort
View
ATVA
2008
Springer
121views Hardware» more  ATVA 2008»
15 years 6 months ago
Model Based Importance Analysis for Minimal Cut Sets
We show how fault injection together with recent advances in stochastic model checking can be combined to form a crucial ingredient for improving quantitative safety analysis. Base...
Eckard Böde, Thomas Peikenkamp, Jan Rakow, Sa...
ATMOS
2007
138views Optimization» more  ATMOS 2007»
15 years 6 months ago
A new concept of robustness
In this paper a new concept of robustness is introduced and the corresponding optimization problem is stated. This new concept is applied to transportation network designs in which...
Ricardo García, Ángel Marín, ...
147
Voted
MEDIAFORENSICS
2010
15 years 6 months ago
Multimodal object authentication with random projections: a worst-case approach
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis testing in random projections domain. We formulate a generic authentication pr...
Oleksiy J. Koval, Sviatoslav Voloshynovskiy
ESANN
2004
15 years 6 months ago
HMM and IOHMM modeling of EEG rhythms for asynchronous BCI systems
We compare the use of two Markovian models, HMMs and IOHMMs, to discriminate between three mental tasks for brain computer interface systems using an asynchronous protocol. We show...
Silvia Chiappa, Nicolas Donckers, Samy Bengio, Fr&...
SODA
2004
ACM
127views Algorithms» more  SODA 2004»
15 years 6 months ago
An optimal randomized algorithm for maximum Tukey depth
We present the first optimal algorithm to compute the maximum Tukey depth (also known as location or halfspace depth) for a non-degenerate point set in the plane. The algorithm is...
Timothy M. Chan