Sciweavers

2015 search results - page 112 / 403
» Hidden Software Capabilities
Sort
View
AAAI
2007
13 years 11 months ago
On the Partial Observability of Temporal Uncertainty
We explore a means to both model and reason about partial observability within the scope of constraintbased temporal reasoning. Prior studies of uncertainty in Temporal CSPs have ...
Michael D. Moffitt
DIMVA
2010
13 years 10 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
IMECS
2007
13 years 10 months ago
A Common Subexpression Sharing Approach for Multiplierless Synthesis of Multiple Constant Multiplications
—In the context of multiple constant multiplications (MCM) design, we propose a novel common-subexpression-elimination (CSE) algorithm that models synthesis of coefficients into ...
Yuen-Hong Alvin Ho, Chi-Un Lei, Ngai Wong
AAAI
2006
13 years 10 months ago
DNNF-based Belief State Estimation
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
Paul Elliott, Brian C. Williams
WSCG
2004
95views more  WSCG 2004»
13 years 10 months ago
Wave Height Forecasting Using Cascade Correlation Neural Network
Forecasting of wave height is necessary in a large number of ocean coastal activities. Recently, neural networks are used for prediction and approximation of wave heights in sea a...
Hamidreza Rashidy Kanan, Karim Faez