Sciweavers

822 search results - page 63 / 165
» Hashing Methods for Temporal Data
Sort
View
SADFE
2008
IEEE
15 years 8 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
EUROPAR
2007
Springer
15 years 6 months ago
On Using Incremental Profiling for the Performance Analysis of Shared Memory Parallel Applications
Abstract. Profiling is often the method of choice for performance analysis of parallel applications due to its low overhead and easily comprehensible results. However, a disadvanta...
Karl Fürlinger, Michael Gerndt, Jack Dongarra
CVPR
2012
IEEE
13 years 4 months ago
Max-margin early event detectors
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While tempor...
Minh Hoai Nguyen, Fernando De la Torre
NIPS
2004
15 years 3 months ago
Nonlinear Blind Source Separation by Integrating Independent Component Analysis and Slow Feature Analysis
In contrast to the equivalence of linear blind source separation and linear independent component analysis it is not possible to recover the original source signal from some unkno...
Tobias Blaschke, Laurenz Wiskott
FM
2011
Springer
357views Formal Methods» more  FM 2011»
14 years 6 months ago
TraceContract: A Scala DSL for Trace Analysis
Abstract. In this paper we describe TRACECONTRACT, an API for trace analysis, implemented in the SCALA programming language. We argue that for certain forms of trace analysis the b...
Howard Barringer, Klaus Havelund