Sciweavers

5544 search results - page 236 / 1109
» Three Inadequate Models
Sort
View
JCSS
2008
159views more  JCSS 2008»
13 years 9 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
SIGOPS
2008
141views more  SIGOPS 2008»
13 years 9 months ago
Using model checkers in an introductory course on operating systems
During the last three years, we have been experimenting with the use of the Uppaal model checker in an introductory course on operating systems for first-year Computer Science stu...
Roelof Hamberg, Frits W. Vaandrager
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
13 years 8 months ago
Estimation of model parameters for steerable needles
Abstract— Flexible needles with bevel tips are being developed as useful tools for minimally invasive surgery and percutaneous therapy. When such a needle is inserted into soft t...
Wooram Park, Kyle Brandon Reed, Allison M. Okamura...
ICCSA
2009
Springer
14 years 4 months ago
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models
Abstract. The accurate prediction of Web navigation patterns has immense commercial value as the Web evolves into a primary medium for marketing and sales for many businesses. Ofte...
Malik Tahir Hassan, Khurum Nazir Junejo, Asim Kari...
ICASSP
2009
IEEE
14 years 4 months ago
Resampling auxiliary data for language model adaptation in machine translation for speech
Performance of n-gram language models depends to a large extent on the amount of training text material available for building the models and the degree to which this text matches...
Sameer Maskey, Abhinav Sethy