Sciweavers

2077 search results - page 333 / 416
» Designing Collaborative Learning Applications
Sort
View
133
Voted
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 8 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
118
Voted
DAC
2006
ACM
15 years 8 months ago
Mining global constraints for improving bounded sequential equivalence checking
In this paper, we propose a novel technique on mining relationships in a sequential circuit to discover global constraints. In contrast to the traditional learning methods, our mi...
Weixin Wu, Michael S. Hsiao
130
Voted
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 8 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
131
Voted
ICRA
2003
IEEE
141views Robotics» more  ICRA 2003»
15 years 7 months ago
Knot planning from observation
—The learning from observation (LFO) paradigm has been widely applied in various types of robot systems. It helps reduce the work of the programmer. However, the applications of ...
Takuma Morita, Jun Takamatsu, Koichi Ogawara, Hiro...
NDSS
2003
IEEE
15 years 7 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel