Sciweavers

861 search results - page 112 / 173
» Predicting Attack-prone Components
Sort
View
SIGCOMM
2006
ACM
14 years 4 months ago
Building an AS-topology model that captures route diversity
An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e.g., making decisions about peering relationships, choice of upstr...
Wolfgang Mühlbauer, Anja Feldmann, Olaf Maenn...
PLDI
2004
ACM
14 years 3 months ago
Min-cut program decomposition for thread-level speculation
With billion-transistor chips on the horizon, single-chip multiprocessors (CMPs) are likely to become commodity components. Speculative CMPs use hardware to enforce dependence, al...
Troy A. Johnson, Rudolf Eigenmann, T. N. Vijaykuma...
SAB
2004
Springer
198views Optimization» more  SAB 2004»
14 years 3 months ago
A Review of Probabilistic Macroscopic Models for Swarm Robotic Systems
Abstract. In this paper, we review methods used for macroscopic modeling and analyzing collective behavior of swarm robotic systems. Although the behavior of an individual robot in...
Kristina Lerman, Alcherio Martinoli, Aram Galstyan
ICIA
2007
14 years 21 days ago
Improving Intelligent Assistants for Desktop Activities
Tasks have been identified as playing an important role to knowledge workers as high-level units for organizing their information. TaskTracer is a task-aware desktop system that l...
Simone Stumpf, Margaret M. Burnett, Thomas G. Diet...
NIPS
2004
13 years 11 months ago
Implicit Wiener Series for Higher-Order Image Analysis
The computation of classical higher-order statistics such as higher-order moments or spectra is difficult for images due to the huge number of terms to be estimated and interprete...
Matthias O. Franz, Bernhard Schölkopf