Sciweavers

1548 search results - page 277 / 310
» Estimating Software Vulnerabilities
Sort
View
PAMI
1998
128views more  PAMI 1998»
15 years 2 months ago
A Hierarchical Latent Variable Model for Data Visualization
—Visualization has proven to be a powerful and widely-applicable tool for the analysis and interpretation of multivariate data. Most visualization algorithms aim to find a projec...
Christopher M. Bishop, Michael E. Tipping
103
Voted
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
15 years 1 months ago
Improvement in listening capability for humanoid robot HRP-2
— This paper describes improvement of sound source separation for a simultaneous automatic speech recognition (ASR) system of a humanoid robot. A recognition error in the system ...
Toru Takahashi, Kazuhiro Nakadai, Kazunori Komatan...
108
Voted
TSE
2010
151views more  TSE 2010»
15 years 29 days ago
The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis
This paper presents an innovative model of a program’s internal behavior over a set of test inputs, called the probabilistic program dependence graph (PPDG), that facilitates pr...
George K. Baah, Andy Podgurski, Mary Jean Harrold
136
Voted
FPL
2010
Springer
180views Hardware» more  FPL 2010»
15 years 18 days ago
A Karatsuba-Based Montgomery Multiplier
Abstract--Modular multiplication of long integers is an important building block for cryptographic algorithms. Although several FPGA accelerators have been proposed for large modul...
Gary Chun Tak Chow, Ken Eguro, Wayne Luk, Philip L...
153
Voted
ICDCS
2010
IEEE
15 years 17 days ago
Safe and Stabilizing Distributed Cellular Flows
Advances in wireless vehicular networks present us with opportunities for developing new distributed traffic control algorithms that avoid phenomena such as abrupt phase-transition...
Taylor Johnson, Sayan Mitra, Karthik Manamcheri