Sciweavers

861 search results - page 128 / 173
» Predicting Attack-prone Components
Sort
View
ICDM
2003
IEEE
134views Data Mining» more  ICDM 2003»
14 years 28 days ago
Probabilistic User Behavior Models
We present a mixture model based approach for learning individualized behavior models for the Web users. We investigate the use of maximum entropy and Markov mixture models for ge...
Eren Manavoglu, Dmitry Pavlov, C. Lee Giles
ICPPW
2003
IEEE
14 years 28 days ago
A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree
Gaussian Cubes (GCs) are a family of interconnection topologies in which the interconnection density and algorithmic efficiency are linked by a common parameter, the variation of ...
Loh Peter, Xinhua Zhang
ICRA
2003
IEEE
91views Robotics» more  ICRA 2003»
14 years 28 days ago
Internal posture sensing for a flexible frame modular mobile robot
- A sensor fusion algorithm for flexible framed modular mobile robots is presented in this paper. This algorithm uses traditional Kalman filters and rigid axle kinematic models to ...
Roy Merrell, Mark A. Minor
PDP
2003
IEEE
14 years 28 days ago
Performance Modeling of Scientific Applications: Scalability Analysis of LAPW0
This paper presents a high-level approach for assessing the performance behavior of complex scientific applications running on a high-performance system through simulation. The pr...
Thomas Fahringer, Nicola Mazzocca, Massimiliano Ra...
RSP
2003
IEEE
147views Control Systems» more  RSP 2003»
14 years 28 days ago
Cache Configuration Exploration on Prototyping Platforms
We describe cache architecture, intended for prototype-oriented IC platforms, that automatically finds the best cache configuration for a particular application. The cache itself ...
Chuanjun Zhang, Frank Vahid