Sciweavers

18924 search results - page 3449 / 3785
» Conformance of Distributed Systems
Sort
View
ICSE
1995
IEEE-ACM
15 years 8 months ago
A Component- and Message-Based Architectural Style for GUI Software
-- While a large fraction of application code is devoted to graphical user interface (GUI) functions, support for reuse in this domain has largely been confined to the creation of...
Richard N. Taylor, Nenad Medvidovic, Kenneth M. An...
AINA
2010
IEEE
15 years 8 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
AINA
2010
IEEE
15 years 8 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
15 years 8 months ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
FOSSACS
2010
Springer
15 years 8 months ago
Degrees of Lookahead in Regular Infinite Games
We study variants of regular infinite games where the strict alternation of moves between the two players is subject to modifications. The second player may postpone a move for a f...
Michael Holtmann, Lukasz Kaiser, Wolfgang Thomas
« Prev « First page 3449 / 3785 Last » Next »