Sciweavers

1548 search results - page 277 / 310
» Estimating Software Vulnerabilities
Sort
View
86
Voted
PAMI
1998
128views more  PAMI 1998»
14 years 10 months ago
A Hierarchical Latent Variable Model for Data Visualization
—Visualization has proven to be a powerful and widely-applicable tool for the analysis and interpretation of multivariate data. Most visualization algorithms aim to find a projec...
Christopher M. Bishop, Michael E. Tipping
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
14 years 9 months ago
Improvement in listening capability for humanoid robot HRP-2
— This paper describes improvement of sound source separation for a simultaneous automatic speech recognition (ASR) system of a humanoid robot. A recognition error in the system ...
Toru Takahashi, Kazuhiro Nakadai, Kazunori Komatan...
TSE
2010
151views more  TSE 2010»
14 years 9 months ago
The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis
This paper presents an innovative model of a program’s internal behavior over a set of test inputs, called the probabilistic program dependence graph (PPDG), that facilitates pr...
George K. Baah, Andy Podgurski, Mary Jean Harrold
FPL
2010
Springer
180views Hardware» more  FPL 2010»
14 years 9 months ago
A Karatsuba-Based Montgomery Multiplier
Abstract--Modular multiplication of long integers is an important building block for cryptographic algorithms. Although several FPGA accelerators have been proposed for large modul...
Gary Chun Tak Chow, Ken Eguro, Wayne Luk, Philip L...
ICDCS
2010
IEEE
14 years 9 months ago
Safe and Stabilizing Distributed Cellular Flows
Advances in wireless vehicular networks present us with opportunities for developing new distributed traffic control algorithms that avoid phenomena such as abrupt phase-transition...
Taylor Johnson, Sayan Mitra, Karthik Manamcheri