Sciweavers

1097 search results - page 17 / 220
» Sequential Object Monitors
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 6 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
COLT
2007
Springer
14 years 2 months ago
Strategies for Prediction Under Imperfect Monitoring
Abstract. We propose simple randomized strategies for sequential prediction under imperfect monitoring, that is, when the forecaster does not have access to the past outcomes but r...
Gábor Lugosi, Shie Mannor, Gilles Stoltz
SEKE
2005
Springer
14 years 1 months ago
Generating Properties for Runtime Monitoring from Software Specification Patterns
The paper presents an approach to support run-time verification of software systems that combines two existing tools, Prospec and Java-MaC, into a single framework. Prospec can be...
Oscar Mondragon, Ann Q. Gates, Humberto Mendoza, O...
ICPR
2008
IEEE
14 years 9 months ago
A new objective function for sequence labeling
We propose a new loss function for discriminative learning of Markov random fields, which is an intermediate loss function between the sequential loss and the pointwise loss. We s...
Hisashi Kashima, Yuta Tsuboi
SIGMOD
2005
ACM
254views Database» more  SIGMOD 2005»
14 years 8 months ago
Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring
Given a set of objects P and a query point q, a k nearest neighbor (k-NN) query retrieves the k objects in P that lie closest to q. Even though the problem is well-studied for sta...
Kyriakos Mouratidis, Marios Hadjieleftheriou, Dimi...