Sciweavers

752 search results - page 102 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
194
Voted
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
121
Voted
BMCBI
2005
89views more  BMCBI 2005»
15 years 3 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
142
Voted
ETRA
2008
ACM
120views Biometrics» more  ETRA 2008»
15 years 5 months ago
Eye movement prediction by Kalman filter with integrated linear horizontal oculomotor plant mechanical model
The goal of this paper is to predict future horizontal eye movement trajectories within a specified time interval. To achieve this goal a linear horizontal oculomotor plant mechan...
Oleg Komogortsev, Javed I. Khan
125
Voted
AIED
2005
Springer
15 years 9 months ago
The Use of Qualitative Reasoning Models of Interactions between Populations to Support Causal Reasoning of Deaf Students
Making inferences is crucial for understanding the world. The school may develop such skills but there are few formal opportunities for that. This paper describes an experiment de...
Paulo Salles, Heloisa Lima-Salles, Bert Bredeweg
142
Voted
JGO
2011
89views more  JGO 2011»
14 years 6 months ago
Model building using bi-level optimization
Abstract In many problems from different disciplines such as engineering, physics, medicine, and biology, a series of experimental data is used in order to generate a model that ca...
Georges K. Saharidis, Ioannis P. Androulakis, Mari...