Sciweavers

5948 search results - page 1168 / 1190
» Computing Robust Counter-Strategies
Sort
View
EMSOFT
2001
Springer
15 years 2 months ago
Some Synchronization Issues When Designing Embedded Systems from Components
Abstract This paper is sort of a confession. Issues of synchrony, asynchrony, and synchronization, arise frequently in designing embedded systems from components, like everyone I k...
Albert Benveniste
RTSS
1999
IEEE
15 years 2 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...
IDMS
1998
Springer
107views Multimedia» more  IDMS 1998»
15 years 2 months ago
Classifying Objectionable Websites Based on Image Content
This paper describes IBCOW Image-based Classi cation of Objectionable Websites, a system capable of classifying a website as objectionable or benign based on image content. The sys...
James Ze Wang, Jia Li, Gio Wiederhold, Oscar Firsc...
IH
1998
Springer
15 years 2 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
KDD
1994
ACM
117views Data Mining» more  KDD 1994»
15 years 1 months ago
Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges
We applied TETRAD II, a causal discovery program developed in Carnegie Mellon University's Department of Philosophy, to a database containing information on 204 U.S. colleges...
Marek J. Druzdze, Clark Glymour
« Prev « First page 1168 / 1190 Last » Next »