Sciweavers

5154 search results - page 81 / 1031
» Computing and using residuals in time series models
Sort
View
CCS
2007
ACM
14 years 3 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
ECOOPW
1999
Springer
14 years 1 months ago
Aspects and Superimpositions
The model checking of applications of aspects is explained, by showing the stages and proof obligations when a collection of generic aspects (called a superimposition) is combined...
Shmuel Katz, Joseph Gil
SIGGRAPH
1990
ACM
14 years 1 months ago
Real-time robot motion planning using rasterizing computer graphics hardware
We presenta real-time robot motion plannerthatis fastandcomplete to a resolution. The technique is guaranteed to find a path if one exists at the resolution, and all paths returne...
Jed Lengyel, Mark Reichert, Bruce Randall Donald, ...
SCIA
2007
Springer
178views Image Analysis» more  SCIA 2007»
14 years 3 months ago
Occluded Facial Expression Tracking
The work presented here takes place in the field of computer aided analysis of facial expressions displayed in sign language videos. We use Active Appearance Models to model a fac...
Hugo Mercier, Julien Peyras, Patrice Dalle
ICANN
2009
Springer
14 years 1 months ago
An EM Based Training Algorithm for Recurrent Neural Networks
Recurrent neural networks serve as black-box models for nonlinear dynamical systems identification and time series prediction. Training of recurrent networks typically minimizes t...
Jan Unkelbach, Yi Sun, Jürgen Schmidhuber