Sciweavers

1370 search results - page 159 / 274
» On the Consistent Observation of Active Systems
Sort
View
RC
2002
72views more  RC 2002»
13 years 8 months ago
Symbolic Preconditioning with Taylor Models: Some Examples
Deterministic global optimization with interval analysis involves - using interval enclosures for ranges of the constraints, objective, and gradient to reject infeasible regions, r...
R. Baker Kearfott, G. William Walster
IJRR
2010
105views more  IJRR 2010»
13 years 7 months ago
Design and Analysis of a Portable Indoor Localization Aid for the Visually Impaired
—In this paper, we present the design and analysis of a portable position and orientation (pose) estimation aid for the visually impaired. Our prototype navigation aid consists o...
Joel A. Hesch, Stergios I. Roumeliotis
INFOCOM
2010
IEEE
13 years 7 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...
ISMIS
2009
Springer
14 years 3 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ICSM
2006
IEEE
14 years 3 months ago
Quantifying the Effects of Aspect-Oriented Programming: A Maintenance Study
One of the main promises of aspect-oriented programming (AOP) is to promote improved modularization of crosscutting concerns, thereby enhancing the software stability in the prese...
Uirá Kulesza, Cláudio Sant'Anna, Ale...