Sciweavers

861 search results - page 72 / 173
» Predicting Attack-prone Components
Sort
View
MCS
2009
Springer
14 years 5 months ago
Selective Ensemble under Regularization Framework
An ensemble is generated by training multiple component learners for a same task and then combining them for predictions. It is known that when lots of trained learners are availab...
Nan Li, Zhi-Hua Zhou
VTC
2008
IEEE
14 years 5 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
RTSS
2005
IEEE
14 years 4 months ago
Quantifying the Gap between Embedded Control Models and Time-Triggered Implementations
Mapping a set of feedback control components to executable code introduces errors due to a variety of factors such as discretization, computational delays, and scheduling policies...
Hakan Yazarel, Antoine Girard, George J. Pappas, R...
ARCS
2005
Springer
14 years 4 months ago
The Bio-Chemical Information Processing Metaphor as a Programming Paradigm for Organic Computing
All known life forms process information on a molecular level. This kind of chemical information processing is known to be robust, self-organizing, adaptive, decentralized, asynch...
Peter Dittrich
ISSS
1995
IEEE
121views Hardware» more  ISSS 1995»
14 years 2 months ago
A comprehensive estimation technique for high-level synthesis
We present an integrated approach aimed at predicting layout area needed to implement a behavioral description for a given performance goal. Our approach is novel because: (1) it ...
Seong Yong Ohm, Fadi J. Kurdahi, Nikil Dutt, Min X...