Sciweavers

1491 search results - page 224 / 299
» Training Linear Discriminant Analysis in Linear Time
Sort
View
HCI
2009
13 years 6 months ago
Mind-Mirror: EEG-Guided Image Evolution
Abstract. We propose a brain-computer interface (BCI) system for evolving images in realtime based on subject feedback derived from electroencephalography (EEG). The goal of this s...
Nima Bigdely Shamlo, Scott Makeig
ISSTA
2000
ACM
14 years 1 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
JCISE
2002
129views more  JCISE 2002»
13 years 8 months ago
Modeling Information Needs in Engineering Databases Using Tacit Knowledge
Online resources of engineering design information are a critical resource for practicing engineers. These online resources often contain references and content associated with te...
Shuang Song, Andy Dong, Alice M. Agogino
IWSEC
2010
Springer
13 years 7 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
SODA
2010
ACM
187views Algorithms» more  SODA 2010»
14 years 6 months ago
An Improved Competitive Algorithm for Reordering Buffer Management
We design and analyze an on-line reordering buffer management algorithm with improved O log k log log k competitive ratio for non-uniform costs, where k is the buffer size. This i...
Noa Avigdor-Elgrabli, Yuval Rabani