Sciweavers

1220 search results - page 110 / 244
» Dependent classes
Sort
View
NECO
1998
83views more  NECO 1998»
13 years 8 months ago
Properties of Support Vector Machines
Support Vector Machines (SVMs) perform pattern recognition between two point classes by nding a decision surface determined by certain points of the training set, termed Support V...
Massimiliano Pontil, Alessandro Verri
WCET
2010
13 years 7 months ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner
ICEIS
2009
IEEE
13 years 6 months ago
Pattern-Based Refactoring of Legacy Software Systems
Rearchitecturing large software systems becomes more and more complex after years of development and a growing size of the code base. Nonetheless, a constant adaptation of software...
Sascha Hunold, Björn Krellner, Thomas Rauber,...
CLUSTER
2004
IEEE
13 years 9 months ago
Towards Real-Time Fault-Tolerant CORBA Middleware
An increasing number of applications are being developed using distributed object computing (DOC) middleware, such as CORBA. Many of these applications require the underlying midd...
Aniruddha S. Gokhale, Balachandran Natarajan, Doug...
RFIDSEC
2010
13 years 7 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...