Sciweavers

335 search results - page 38 / 67
» Reasoning about Probabilistic Security Using Task-PIOAs
Sort
View
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
12 years 7 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
TRUSTBUS
2007
Springer
14 years 1 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
IJCNN
2006
IEEE
14 years 1 months ago
Recognizing Human Emotion from Partial Facial Features
—Recognizing human emotions from partial facial features is quite hard to achieve reasonable accuracy. In this paper, we propose to use a tree structure representation to simulat...
Jia-Jun Wong, Siu-Yeung Cho
ATAL
2006
Springer
13 years 9 months ago
Camera-based observation of football games for analyzing multi-agent activities
This paper describes a camera-based observation system for football games that is used for the automatic analysis of football games and reasoning about multi-agent activity. The o...
Michael Beetz, Nico von Hoyningen-Huene, Jan Bando...
AAAI
2011
12 years 7 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier