Sciweavers

2801 search results - page 48 / 561
» On the Adequateness of the Connection Method
Sort
View
SAS
2004
Springer
14 years 2 months ago
The Octahedron Abstract Domain
hedron Abstract Domain Robert Claris´o and Jordi Cortadella Universitat Polit`ecnica de Catalunya Barcelona, Spain Abstract. An interesting area in static analysis is the study of...
Robert Clarisó, Jordi Cortadella
ICML
1990
IEEE
14 years 28 days ago
Explanations of Empirically Derived Reactive Plans
Given an adequate simulation model of the task environment and payoff function that measures the quality of partially successful plans, competition-based heuristics such as geneti...
Diana F. Gordon, John J. Grefenstette
CAI
2006
Springer
13 years 9 months ago
Analyzing Approaches to Collective Knowledge Recall
People and organizations frequently need to recall past events that, for some reason, were not documented when they occurred. The successful reconstitution of past events depends o...
Naiana Carminatti, Marcos R. S. Borges, José...
IJSN
2006
65views more  IJSN 2006»
13 years 8 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
CVPR
2006
IEEE
14 years 11 months ago
Control Theory and Fast Marching Techniques for Brain Connectivity Mapping
We propose a novel, fast and robust technique for the computation of anatomical connectivity in the brain. Our approach exploits the information provided by Diffusion Tensor Magne...
Emmanuel Prados, Stefano Soatto, Christophe Lengle...