Sciweavers

4650 search results - page 640 / 930
» Generating and evaluating evaluative arguments
Sort
View
QEST
2008
IEEE
15 years 11 months ago
Hintikka Games for PCTL on Labeled Markov Chains
We present Hintikka games for formulae of the probabilistic temporal logic PCTL and countable labeled Markov chains as models, giving an operational account of the denotational se...
Harald Fecher, Michael Huth, Nir Piterman, Daniel ...
SIPS
2008
IEEE
15 years 11 months ago
Efficient mapping of advanced signal processing algorithms on multi-processor architectures
Modern microprocessor technology is migrating from simply increasing clock speeds on a single processor to placing multiple processors on a die to increase throughput and power pe...
Bhavana B. Manjunath, Aaron S. Williams, Chaitali ...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 11 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
SUTC
2008
IEEE
15 years 11 months ago
Effective Feature Space Reduction with Imbalanced Data for Semantic Concept Detection
Semantic understanding of multimedia content has become a very popular research topic in recent years. Semantic concept detection algorithms face many challenges such as the seman...
Lin Lin, Guy Ravitz, Mei-Ling Shyu, Shu-Ching Chen
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 11 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...