Sciweavers

105 search results - page 16 / 21
» Guidance through active concerns
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 10 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
AR
2007
105views more  AR 2007»
13 years 7 months ago
Reinforcement learning of a continuous motor sequence with hidden states
—Reinforcement learning is the scheme for unsupervised learning in which robots are expected to acquire behavior skills through self-explorations based on reward signals. There a...
Hiroaki Arie, Tetsuya Ogata, Jun Tani, Shigeki Sug...
IPM
2010
134views more  IPM 2010»
13 years 6 months ago
Breakdowns in collaborative information seeking: A study of the medication process
Collaborative information seeking is integral to many professional activities. In hospital work, the medication process encompasses continual seeking for information and collaborat...
Morten Hertzum
ICSM
2009
IEEE
14 years 2 months ago
A theoretical and empirical study of EFSM dependence
Dependence analysis underpins many activities in software maintenance such as comprehension and impact analysis. As a result, dependence has been studied widely for programming la...
Kelly Androutsopoulos, Nicolas Gold, Mark Harman, ...
AVSS
2007
IEEE
14 years 2 months ago
Detection of abandoned objects in crowded environments
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially da...
Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, J...