Sciweavers

1855 search results - page 258 / 371
» Composing model programs for analysis
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICCAD
2004
IEEE
155views Hardware» more  ICCAD 2004»
15 years 6 months ago
Robust analog/RF circuit design with projection-based posynomial modeling
In this paper we propose a RObust Analog Design tool (ROAD) for post-tuning analog/RF circuits. Starting from an initial design derived from hand analysis or analog circuit synthe...
Xin Li, Padmini Gopalakrishnan, Yang Xu, Lawrence ...
NIPS
2008
14 years 11 months ago
Improved Moves for Truncated Convex Models
We consider the problem of obtaining the approximate maximum a posteriori estimate of a discrete random field characterized by pairwise potentials that form a truncated convex mod...
M. Pawan Kumar, Philip H. S. Torr
IEAAIE
2004
Springer
15 years 3 months ago
Machine Learning Approaches for Inducing Student Models
The main issue in e-learning is student modelling, i.e. the analysis of a student’s behaviour and prediction of his/her future behaviour and learning performance. Indeed, it is d...
Oriana Licchelli, Teresa Maria Altomare Basile, Ni...
CLUSTER
2003
IEEE
15 years 3 months ago
Implications of a PIM Architectural Model for MPI
Memory may be the only system component that is more commoditized than a microprocessor. To simultaneously exploit this and address the impending memory wall, processing in memory...
Arun Rodrigues, Richard C. Murphy, Peter M. Kogge,...