Sciweavers

886 search results - page 109 / 178
» Experiences Using Lightweight Formal Methods for Requirement...
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ECCV
2004
Springer
15 years 3 months ago
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonics
Abstract. We propose a new method for face recognition under arbitrary pose and illumination conditions, which requires only one training image per subject. Furthermore, no limitat...
Lei Zhang 0002, Dimitris Samaras
AUSAI
2004
Springer
15 years 3 months ago
Reliable Unseen Model Prediction for Vocabulary-Independent Speech Recognition
Speech recognition technique is expected to make a great impact on many user interface areas such as toys, mobile phones, PDAs, and home appliances. Those applications basically re...
Sungtak Kim, Hoirin Kim
CRV
2009
IEEE
115views Robotics» more  CRV 2009»
15 years 4 months ago
Learning Model Complexity in an Online Environment
In this paper we introduce the concept and method for adaptively tuning the model complexity in an online manner as more examples become available. Challenging classification pro...
Dan Levi, Shimon Ullman
ICANN
2001
Springer
15 years 2 months ago
Independent Variable Group Analysis
Humans tend to group together related properties in order to understand complex phenomena. When modeling large problems with limited representational resources, it is important to...
Krista Lagus, Esa Alhoniemi, Harri Valpola