Sciweavers

1486 search results - page 144 / 298
» Firewall Rules Analysis
Sort
View
ACSD
2001
IEEE
74views Hardware» more  ACSD 2001»
15 years 8 months ago
From Code to Models
One of the corner stones of formal methods is the notion traction enables analysis. By the construction of act model we can trade implementation detail for analytical power. The i...
Gerard J. Holzmann
ICA
2010
Springer
15 years 5 months ago
Adaptive Underdetermined ICA for Handling an Unknown Number of Sources
Independent Component Analysis is the best known method for solving blind source separation problems. In general, the number of sources must be known in advance. In many cases, pre...
Andreas Sandmair, Alam Zaib, Fernando Puente Le&oa...
IJON
2002
84views more  IJON 2002»
15 years 4 months ago
On the generative probability density model in the self-organizing map
The Self-Organizing Map, SOM, is a widely used tool in exploratory data analysis. A major drawback of the SOM has been the lack of a theoretically justified criterion for model se...
Timo Kostiainen, Jouko Lampinen
ICDAR
2009
IEEE
15 years 2 months ago
Disease-Specific Extraction of Text from Cardiac Echo Videos for Decision Support
Echo videos are an important modality for cardiac decision support. In addition to describing the shape and motion of the heart, they capture important diagnostic measurements as ...
Tanveer Fathima Syeda-Mahmood, David Beymer, Arnon...
VIS
2008
IEEE
172views Visualization» more  VIS 2008»
16 years 5 months ago
Color Design for Illustrative Visualization
Professional designers and artists are quite cognizant of the rules that guide the design of effective color palettes, from both aesthetic and attention-guiding points of view. In ...
Lujin Wang, Joachim Giesen, Kevin T. McDonnell, ...