Sciweavers

2056 search results - page 288 / 412
» Detecting Errors in Spreadsheets
Sort
View
ECCC
2006
96views more  ECCC 2006»
15 years 4 months ago
When Does Greedy Learning of Relevant Features Succeed? --- A Fourier-based Characterization ---
Detecting the relevant attributes of an unknown target concept is an important and well studied problem in algorithmic learning. Simple greedy strategies have been proposed that s...
Jan Arpe, Rüdiger Reischuk
IJNSEC
2008
118views more  IJNSEC 2008»
15 years 4 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
IJHPCN
2006
109views more  IJHPCN 2006»
15 years 4 months ago
Communication issues within high performance computing grids
: This paper presents several ideas pertaining to desirable properties associated with protocols for moving large amounts of data over a grid of high performance computers. The pro...
Robert D. McLeod, Sajid Hussain, Sheng Huang, Mare...
133
Voted
IVC
2006
113views more  IVC 2006»
15 years 4 months ago
Minimal-latency human action recognition using reliable-inference
We present a probabilistic reliable-inference framework to address the issue of rapid detection of human actions with low error rates. The approach determines the shortest video e...
James W. Davis, Ambrish Tyagi
ENTCS
2007
156views more  ENTCS 2007»
15 years 4 months ago
Bounded Model Checking with Parametric Data Structures
Bounded Model Checking (BMC) is a successful refutation method to detect errors in not only circuits and other binary systems but also in systems with more complex domains like ti...
Erika Ábrahám, Marc Herbstritt, Bern...