Sciweavers

420 search results - page 51 / 84
» Fault Analysis Study of IDEA
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 10 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
FAST
2009
13 years 7 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
AGP
1999
IEEE
14 years 2 months ago
Widening Sharing
We study the problem of an efficient and precise sharing analysis of (constraint) logic programs. After recognizing that neither aring nor its non-redundant (but equivalent) abstra...
Enea Zaffanella, Roberto Bagnara, Patricia M. Hill
TVCG
2008
140views more  TVCG 2008»
13 years 9 months ago
Efficient Morse Decompositions of Vector Fields
Vector field analysis plays a crucial role in many engineering applications, such as weather prediction, tsunami and hurricane study, and airplane and automotive design. Existing ...
Guoning Chen, Konstantin Mischaikow, Robert S. Lar...
HRI
2010
ACM
14 years 4 months ago
Investigating multimodal real-time patterns of joint attention in an hri word learning task
Abstract—Joint attention – the idea that humans make inferences from observable behaviors of other humans by attending to the objects and events that these others humans attend...
Chen Yu, Matthias Scheutz, Paul W. Schermerhorn