Sciweavers

15792 search results - page 2933 / 3159
» Computational Abstraction Steps
Sort
View
BIRTHDAY
2007
Springer
15 years 4 months ago
Deriving Specifications for Systems That Are Connected to the Physical World
Well understood methods exist for developing programs from formal specifications. Not only do such methods offer a precise check that certain sorts of deviations from their specifi...
Cliff B. Jones, Ian J. Hayes, Michael A. Jackson
PERCOM
2010
ACM
15 years 4 months ago
Indoor localization in multi-floor environments with reduced effort
Abstract—In pervasive computing, localizing a user in wireless indoor environments is an important yet challenging task. Among the state-of-art localization methods, fingerprint...
Hua-Yan Wang, Vincent Wenchen Zheng, Junhui Zhao, ...
AINA
2004
IEEE
15 years 4 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
ANTS
2006
Springer
73views Algorithms» more  ANTS 2006»
15 years 4 months ago
The Elliptic Curve Database for Conductors to 130000
Abstract. Tabulating elliptic curves has been carried out since the earliest days of machine computation in number theory. After some historical remarks, we report on significant r...
John Cremona
CG
2004
Springer
15 years 4 months ago
Locally Informed Global Search for Sums of Combinatorial Games
Abstract. There are two complementary approaches to playing sums of combinatorial games. They can be characterized as local analysis and global search. Algorithms from combinatoria...
Martin Müller 0003, Zhichao Li
« Prev « First page 2933 / 3159 Last » Next »