Sciweavers

591 search results - page 12 / 119
» Simulation Input Updating Using Bayesian Techniques
Sort
View
EDBT
2009
ACM
144views Database» more  EDBT 2009»
14 years 9 days ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu
DELTA
2008
IEEE
14 years 2 months ago
Compact Models for Signal Transient and Crosstalk Noise of Coupled RLC Interconnect Lines with Ramp Inputs
Analytical compact form models for the signal transient and crosstalk noise of two-coupled RLC lines are developed. Capacitive and inductive coupling effects are investigated and ...
Taehoon Kim, Dongchul Kim, Jung-A Lee, Yungseon Eo
ICST
2009
IEEE
13 years 6 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
ICARCV
2006
IEEE
164views Robotics» more  ICARCV 2006»
14 years 2 months ago
Fast Object Extraction from Bayesian Occupancy Grids using Self Organizing Networks
— Despite their popularity, occupancy grids cannot be directly applied to problems where the identity of the objects populating an environment needs to be taken into account (eg ...
Dizan Vasquez, Fabrizio Romanelli, Thierry Fraicha...
ICCV
2005
IEEE
14 years 10 months ago
A Bayesian Approach for Shadow Extraction from a Single Image
This paper addresses the problem of shadow extraction from a single image of a complex natural scene. No simplifying assumption on the camera and the light source other than the L...
Tai-Pang Wu, Chi-Keung Tang