Sciweavers

1718 search results - page 110 / 344
» Modeling and testing of cloud applications
Sort
View
AAAI
2007
14 years 10 days ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
IVA
2009
Springer
14 years 4 months ago
Human-Centered Distributed Conversational Modeling: Efficient Modeling of Robust Virtual Human Conversations
Currently, applications that focus on providing conversations with virtual humans require extensive work to create robust conversational models. We present a new approach called Hu...
Brent Rossen, Scott Lind, Benjamin Lok
ICANN
2009
Springer
14 years 4 months ago
Adaptive Ensemble Models of Extreme Learning Machines for Time Series Prediction
Abstract. In this paper, we investigate the application of adaptive ensemble models of Extreme Learning Machines (ELMs) to the problem of one-step ahead prediction in (non)stationa...
Mark van Heeswijk, Yoan Miche, Tiina Lindh-Knuutil...
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
14 years 4 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
CVPR
2008
IEEE
15 years 1 days ago
Auto-context and its application to high-level vision tasks
The notion of using context information for solving highlevel vision problems has been increasingly realized in the field. However, how to learn an effective and efficient context...
Zhuowen Tu