Sciweavers

2610 search results - page 337 / 522
» Computational Probabilistic Non-interference
Sort
View
129
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 26 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
108
Voted
ISQED
2009
IEEE
112views Hardware» more  ISQED 2009»
15 years 10 months ago
Estimation and optimization of reliability of noisy digital circuits
— With continued scaling, reliability is emerging as a critical challenge for the designers of digital circuits. The challenge stems in part from the lack of computationally ef...
Satish Sivaswamy, Kia Bazargan, Marc D. Riedel
IROS
2009
IEEE
147views Robotics» more  IROS 2009»
15 years 10 months ago
A multi-hypothesis topological SLAM approach for loop closing on edge-ordered graphs
— We present a method for topological SLAM that specifically targets loop closing for edge-ordered graphs. Instead of using a heuristic approach to accept or reject loop closing...
Stephen Tully, George Kantor, Howie Choset, Felix ...
106
Voted
AIED
2009
Springer
15 years 10 months ago
A Phoneme-Based Student Model for Adaptive Spelling Training
We present a novel phoneme-based student model for spelling training. Our model is data driven, adapts to the user and provides information for, e.g., optimal word selection. We de...
Gian-Marco Baschera, Markus Gross
126
Voted
DFG
2009
Springer
15 years 10 months ago
A Survey on Approximation Algorithms for Scheduling with Machine Unavailability
In this chapter we present recent contributions in the field of sequential job scheduling on network machines which work in parallel; these are subject to temporary unavailability...
Florian Diedrich, Klaus Jansen, Ulrich M. Schwarz,...