Sciweavers

4276 search results - page 791 / 856
» Techniques for Empirical Validation
Sort
View
ML
2010
ACM
151views Machine Learning» more  ML 2010»
13 years 8 months ago
Inductive transfer for learning Bayesian networks
In several domains it is common to have data from different, but closely related problems. For instance, in manufacturing, many products follow the same industrial process but with...
Roger Luis, Luis Enrique Sucar, Eduardo F. Morales
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 8 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
TCSB
2010
13 years 8 months ago
Biomodel Engineering - From Structure to Behavior
Biomodel engineering is the science of designing, constructing and analyzing computational models of biological systems. It forms a systematic and powerful extension of earlier mat...
Rainer Breitling, Robin Donaldson, David R. Gilber...
TKDE
2010
152views more  TKDE 2010»
13 years 8 months ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
MASS
2010
133views Communications» more  MASS 2010»
13 years 8 months ago
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure
Abstract--Spread spectrum techniques (e.g., Frequency Hopping (FH), Direct Sequence Spread Spectrum (DSSS)) have been widely used for anti-jamming wireless communications. Such tec...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu