Sciweavers

681 search results - page 110 / 137
» Business Process Simulation for Operational Decision Support
Sort
View
145
Voted
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 8 months ago
Model Checking Discounted Temporal Properties
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, tempor...
Luca de Alfaro, Marco Faella, Thomas A. Henzinger,...
113
Voted
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
15 years 9 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...
CVPR
2005
IEEE
16 years 5 months ago
MosaicShape: Stochastic Region Grouping with Shape Prior
A method that combines shape-based object recognition and image segmentation is proposed for shape retrieval from images. Given a shape prior represented in a multiscale curvature...
Jingbin Wang, Erdan Gu, Margrit Betke
143
Voted
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 9 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
136
Voted
JMLR
2006
132views more  JMLR 2006»
15 years 3 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof