Sciweavers

5722 search results - page 1137 / 1145
» Security Function Interactions
Sort
View
TSE
1998
176views more  TSE 1998»
13 years 8 months ago
Constructive Protocol Specification Using Cicero
—New protocols are often useful, but are hard to implement well. Protocol synthesis is a solution, but synthesized protocols can be slow. Implementing protocols will be even more...
Yen-Min Huang, Chinya V. Ravishankar
VLDB
1998
ACM
170views Database» more  VLDB 1998»
13 years 8 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...
PAMI
2007
186views more  PAMI 2007»
13 years 8 months ago
Value-Directed Human Behavior Analysis from Video Using Partially Observable Markov Decision Processes
—This paper presents a method for learning decision theoretic models of human behaviors from video data. Our system learns relationships between the movements of a person, the co...
Jesse Hoey, James J. Little
BRAIN
2010
Springer
13 years 7 months ago
Sparse Regression Models of Pain Perception
Discovering brain mechanisms underlying pain perception remains a challenging neuroscientific problem with important practical applications, such as developing better treatments f...
Irina Rish, Guillermo A. Cecchi, Marwan N. Baliki,...
INFOCOM
2010
IEEE
13 years 7 months ago
Socially-Aware Network Design Games
—In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wh...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
« Prev « First page 1137 / 1145 Last » Next »