Sciweavers

681 search results - page 110 / 137
» Business Process Simulation for Operational Decision Support
Sort
View
114
Voted
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 5 months ago
Model Checking Discounted Temporal Properties
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, tempor...
Luca de Alfaro, Marco Faella, Thomas A. Henzinger,...
85
Voted
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
15 years 6 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...
CVPR
2005
IEEE
16 years 2 months ago
MosaicShape: Stochastic Region Grouping with Shape Prior
A method that combines shape-based object recognition and image segmentation is proposed for shape retrieval from images. Given a shape prior represented in a multiscale curvature...
Jingbin Wang, Erdan Gu, Margrit Betke
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 6 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
JMLR
2006
132views more  JMLR 2006»
15 years 13 days ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof