Sciweavers

325 search results - page 27 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
106
Voted
CAV
2009
Springer
176views Hardware» more  CAV 2009»
16 years 1 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
118
Voted
GRC
2010
IEEE
15 years 1 months ago
Optimal Factorization of Three-Way Binary Data
We present a problem of factor analysis of three-way binary data, i.e. data described by a 3-dimensional binary matrix I, describing a relationship between objects, attributes, an...
Radim Belohlávek, Vilém Vychodil
LISP
2008
154views more  LISP 2008»
15 years 13 days ago
Types and trace effects for object orientation
Trace effects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type a...
Christian Skalka
128
Voted
JMLR
2010
198views more  JMLR 2010»
14 years 7 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
108
Voted
ICDM
2009
IEEE
147views Data Mining» more  ICDM 2009»
14 years 10 months ago
Greedy Optimization for Contiguity-Constrained Hierarchical Clustering
The discovery and construction of inherent regions in large spatial datasets is an important task for many research domains such as climate zoning, eco-region analysis, public heal...
Diansheng Guo