Sciweavers

4150 search results - page 572 / 830
» A Practical Approach to Model Extension
Sort
View
146
Voted
ISSA
2004
15 years 6 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
AI
2000
Springer
15 years 4 months ago
On agent-based software engineering
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly impro...
Nicholas R. Jennings
236
Voted
TC
2002
15 years 4 months ago
Dynamic Power Management for Nonstationary Service Requests
Dynamic Power Management (DPM) is a design methodology aiming at reducing power consumption of electronic systems by performing selective shutdown of idle system resources. The eff...
Eui-Young Chung, Luca Benini, Alessandro Bogliolo,...
140
Voted
ET
2010
98views more  ET 2010»
15 years 3 months ago
MONSOON: SAT-Based ATPG for Path Delay Faults Using Multiple-Valued Logics
Abstract As technology scales down into the nanometer era, delay testing of modern chips has become more and more important. Tests for the path delay fault model are widely used to...
Stephan Eggersglüß, Görschwin Fey,...
PAMI
2010
238views more  PAMI 2010»
15 years 3 months ago
Tracking Motion, Deformation, and Texture Using Conditionally Gaussian Processes
—We present a generative model and inference algorithm for 3D nonrigid object tracking. The model, which we call G-flow, enables the joint inference of 3D position, orientation, ...
Tim K. Marks, John R. Hershey, Javier R. Movellan