Sciweavers

6560 search results - page 1217 / 1312
» The Human Context of Information Systems
Sort
View
SOFTVIS
2010
ACM
13 years 9 months ago
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Developers must often diagnose anomalies in programs they only have a partial knowledge of. As a result, they must simultaneously reverse engineer parts of the system they are unf...
Shen Lin 0003, François Taïani, Thomas...
ICASSP
2010
IEEE
13 years 9 months ago
Empirical Type-i filter design for image interpolation
Empirical filter designs generalize relationships inferred from training data to effect realistic solutions that conform well to the human visual system. Complex algorithms invol...
Karl S. Ni, Truong Q. Nguyen
GISCIENCE
2010
Springer
215views GIS» more  GISCIENCE 2010»
13 years 9 months ago
Microtheories for Spatial Data Infrastructures - Accounting for Diversity of Local Conceptualizations at a Global Level
The categorization of our environment into feature types is an essential prerequisite for cartography, geographic information retrieval, routing applications, spatial decision supp...
Stephanie Duce, Krzysztof Janowicz
IJRR
2008
186views more  IJRR 2008»
13 years 9 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...
CN
2007
137views more  CN 2007»
13 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
« Prev « First page 1217 / 1312 Last » Next »