Sciweavers

1220 search results - page 110 / 244
» Dependent classes
Sort
View
NECO
1998
83views more  NECO 1998»
15 years 12 days ago
Properties of Support Vector Machines
Support Vector Machines (SVMs) perform pattern recognition between two point classes by nding a decision surface determined by certain points of the training set, termed Support V...
Massimiliano Pontil, Alessandro Verri
107
Voted
WCET
2010
14 years 10 months ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner
157
Voted
ICEIS
2009
IEEE
14 years 10 months ago
Pattern-Based Refactoring of Legacy Software Systems
Rearchitecturing large software systems becomes more and more complex after years of development and a growing size of the code base. Nonetheless, a constant adaptation of software...
Sascha Hunold, Björn Krellner, Thomas Rauber,...
108
Voted
CLUSTER
2004
IEEE
15 years 18 days ago
Towards Real-Time Fault-Tolerant CORBA Middleware
An increasing number of applications are being developed using distributed object computing (DOC) middleware, such as CORBA. Many of these applications require the underlying midd...
Aniruddha S. Gokhale, Balachandran Natarajan, Doug...
106
Voted
RFIDSEC
2010
14 years 11 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...