Sciweavers

476 search results - page 88 / 96
» MUSETTE: a framework for knowledge capture from experience
Sort
View
HASE
1998
IEEE
13 years 11 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
LREC
2010
183views Education» more  LREC 2010»
13 years 8 months ago
Lexical Semantic Resources in a Terminological Network
A research has been carried on and is still in progress aimed at the construction of three specialized lexicons organized as databases of relational type. The three databases cont...
Rita Marinelli, Adriana Roventini, Giovanni Spadon...
ASC
2006
13 years 8 months ago
Supervised neuronal approaches for EEG signal classification: Experimental studies
Using artificial neural networks for Electroencephalogram (EEG) signal interpretation is a very challenging tasks for several reasons. The first class of reasons refers to the nat...
Frédéric Alexandre, Kerkeni Nizar, K...
SIGKDD
2008
138views more  SIGKDD 2008»
13 years 7 months ago
Learning preferences of new users in recommender systems: an information theoretic approach
Recommender systems are a nice tool to help nd items of interest from an overwhelming number of available items. Collaborative Filtering (CF), the best known technology for recomme...
Al Mamunur Rashid, George Karypis, John Riedl
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks