Sciweavers

2351 search results - page 57 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
UAI
2007
14 years 11 months ago
User-Centered Methods for Rapid Creation and Validation of Bayesian Belief Networks
Bayesian networks (BN) are particularly well suited to capturing vague and uncertain knowledge. However, the capture of this knowledge and associated reasoning from human domain e...
Jonathan D. Pfautz, Zach Cox, Geoffrey Catto, Davi...
ICPR
2006
IEEE
15 years 11 months ago
Weakly Supervised Learning on Pre-image Problem in Kernel Methods
This paper presents a novel alternative approach, namely weakly supervised learning (WSL), to learn the pre-image of a feature vector in the feature space induced by a kernel. It ...
Weishi Zheng, Jian-Huang Lai, Pong Chi Yuen
GLOBECOM
2008
IEEE
15 years 4 months ago
Terabit Ethernet: A Time-Space Carrier Sense Multiple Access Method
To achieve Terabit and Petabit switching, both time (high transmission speed) and space (multi-stage interconnection network) technologies are required. We propose an Ethernet for...
Joseph Y. Hui, David A. Daniel
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 4 months ago
Stochastic Formal Methods: An Application to Accuracy of Numeric Software
— This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implic...
Marc Daumas, David Lester
ICAC
2009
IEEE
15 years 4 months ago
Applying genetic algorithms to decision making in autonomic computing systems
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...