Sciweavers

4166 search results - page 305 / 834
» Automating the constraining process
Sort
View
CSFW
2000
IEEE
15 years 9 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
COLT
2006
Springer
15 years 8 months ago
Online Learning Meets Optimization in the Dual
We describe a novel framework for the design and analysis of online learning algorithms based on the notion of duality in constrained optimization. We cast a sub-family of universa...
Shai Shalev-Shwartz, Yoram Singer
ECCV
2006
Springer
15 years 8 months ago
Fast Segmentation of the Mitral Valve Leaflet in Echocardiography
This paper presents a semi-automatic method for tracking the mitral valve leaflet in transesophageal echocardiography. The algorithm requires a manual initialization and then segme...
Sébastien Martin, Vincent Daanen, Olivier C...
IWSAS
2000
Springer
15 years 8 months ago
Imposing Real-Time Constraints on Self-Adaptive Controller Synthesis
Abstract. Self-adaptive systems must recon gure themselves, at runtime, to compensate for changing environments, objectives, and system capabilities. This paper discusses how the S...
David J. Musliner
AISB
1995
Springer
15 years 8 months ago
The Ant Colony Metaphor for Searching Continuous Design Spaces
This paper describes a form of dynamical computational system--4he ant colony---and presents an ant colony model for continuous space optimisation problems. The ant colony metapho...
George Bilchev, Ian C. Parmee