Sciweavers

559 search results - page 70 / 112
» Isolation and Analysis of Optimization Errors
Sort
View
SDM
2009
SIAM
130views Data Mining» more  SDM 2009»
14 years 5 months ago
FuncICA for Time Series Pattern Discovery.
We introduce FuncICA, a new independent component analysis method for pattern discovery in inherently functional data, such as time series data. FuncICA can be considered an analo...
Alexander Gray, Nishant Mehta
SOSP
2005
ACM
14 years 5 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 22 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
DAS
2006
Springer
14 years 5 days ago
Combining Multiple Classifiers for Faster Optical Character Recognition
Traditional approaches to combining classifiers attempt to improve classification accuracy at the cost of increased processing. They may be viewed as providing an accuracy-speed tr...
Kumar Chellapilla, Michael Shilman, Patrice Simard
CASES
2005
ACM
13 years 10 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua