Sciweavers

2634 search results - page 438 / 527
» Faster Than Uppaal
Sort
View
CCS
2008
ACM
14 years 1 days ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ETRA
2008
ACM
130views Biometrics» more  ETRA 2008»
13 years 11 months ago
Longitudinal evaluation of discrete consecutive gaze gestures for text entry
Eye-typing performance results are reported from controlled studies comparing an on-screen keyboard and EyeWrite, a new on-screen gestural input alternative. Results from the firs...
Jacob O. Wobbrock, James Rubinstein, Michael W. Sa...
SDM
2010
SIAM
204views Data Mining» more  SDM 2010»
13 years 11 months ago
Scalable Tensor Factorizations with Missing Data
The problem of missing data is ubiquitous in domains such as biomedical signal processing, network traffic analysis, bibliometrics, social network analysis, chemometrics, computer...
Evrim Acar, Daniel M. Dunlavy, Tamara G. Kolda, Mo...
MASCOTS
2008
13 years 11 months ago
Optimizing Galois Field Arithmetic for Diverse Processor Architectures and Applications
Galois field implementations are central to the design of many reliable and secure systems, with many systems implementing them in software. The two most common Galois field opera...
Kevin M. Greenan, Ethan L. Miller, Thomas J. E. Sc...
NIPS
2007
13 years 11 months ago
Robust Regression with Twinned Gaussian Processes
We propose a Gaussian process (GP) framework for robust inference in which a GP prior on the mixing weights of a two-component noise model augments the standard process over laten...
Andrew Naish-Guzman, Sean B. Holden