Sciweavers

822 search results - page 51 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 5 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ISQED
2008
IEEE
103views Hardware» more  ISQED 2008»
14 years 2 months ago
Modeling of NBTI-Induced PMOS Degradation under Arbitrary Dynamic Temperature Variation
Negative bias temperature instability (NBTI) is one of the primary limiters of reliability lifetime in nano-scale integrated circuits. NBTI manifests itself in a gradual increase ...
Bin Zhang, Michael Orshansky
JMM2
2007
148views more  JMM2 2007»
13 years 8 months ago
Object Segmentation Using Background Modelling and Cascaded Change Detection
— The automatic extraction and analysis of visual information is becoming generalised. The first step in this processing chain is usually separating or segmenting the captured v...
Luís Filipe Teixeira, Jaime S. Cardoso, Lu&...
ETRA
2010
ACM
221views Biometrics» more  ETRA 2010»
14 years 2 months ago
Advanced gaze visualizations for three-dimensional virtual environments
Gaze visualizations represent an effective way for gaining fast insights into eye tracking data. Current approaches do not adequately support eye tracking studies for three-dimens...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
GECCO
2010
Springer
189views Optimization» more  GECCO 2010»
14 years 26 days ago
Knowledge mining with genetic programming methods for variable selection in flavor design
This paper presents a novel approach for knowledge mining from a sparse and repeated measures dataset. Genetic programming based symbolic regression is employed to generate multip...
Katya Vladislavleva, Kalyan Veeramachaneni, Matt B...