Sciweavers

5255 search results - page 251 / 1051
» Formal Methods for Privacy
Sort
View
USAB
2007
15 years 5 months ago
User-Centered Methods Are Insufficient for Safety Critical Systems
The traditional approaches of HCI are essential, but they are unable to cope with the complexity of typical modern interactive devices in the safety critical context of medical dev...
Harold W. Thimbleby
ICML
2003
IEEE
16 years 5 months ago
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods
We analyze the formal grounding behind Negative Correlation (NC) Learning, an ensemble learning technique developed in the evolutionary computation literature. We show that by rem...
Gavin Brown, Jeremy L. Wyatt
CODES
2006
IEEE
15 years 10 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst
NOSSDAV
2005
Springer
15 years 9 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
DILS
2004
Springer
15 years 9 months ago
Heterogeneous Data Integration with the Consensus Clustering Formalism
Meaningfully integrating massive multi-experimental genomic data sets is becoming critical for the understanding of gene function. We have recently proposed methodologies for integ...
Vladimir Filkov, Steven Skiena