Sciweavers

2038 search results - page 342 / 408
» Loops under Strategies
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
TKDE
2012
226views Formal Methods» more  TKDE 2012»
11 years 11 months ago
DDD: A New Ensemble Approach for Dealing with Concept Drift
—Online learning algorithms often have to operate in the presence of concept drifts. A recent study revealed that different diversity levels in an ensemble of learning machines a...
Leandro L. Minku, Xin Yao
CVPR
2007
IEEE
14 years 10 months ago
Parameter Sensitive Detectors
Object detection can be challenging when the object class exhibits large variations. One commonly-used strategy is to first partition the space of possible object variations and t...
Quan Yuan, Ashwin Thangali, Vitaly Ablavsky, Stan ...
WWW
2004
ACM
14 years 9 months ago
ResEval: a web-based evaluation system for internal medicine house staff
The evaluation and assessment of physicians-in-training (house staff) is a complex task. Residency training programs are under increasing pressure [1] to provide accurate and comp...
Henry J. Feldman, Marc M. Triola
POPL
2007
ACM
14 years 9 months ago
Program verification as probabilistic inference
In this paper, we propose a new algorithm for proving the validity or invalidity of a pre/postcondition pair for a program. The algorithm is motivated by the success of the algori...
Sumit Gulwani, Nebojsa Jojic