Sciweavers

7379 search results - page 1455 / 1476
» How Many Clusters
Sort
View
144
Voted
ICMLA
2010
15 years 21 days ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
134
Voted
ICTAC
2010
Springer
15 years 21 days ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
129
Voted
IEAAIE
2010
Springer
15 years 21 days ago
Psychophysical Evaluation for a Qualitative Semantic Image Categorisation and Retrieval Approach
This paper details the behavioral evaluation of a qualitative image categorisation and retrieval approach using semantic features of images. Content based image retrieval and class...
Zia Ul-Qayyum, A. G. Cohn, Alexander Klippel
102
Voted
IPPS
2010
IEEE
15 years 20 days ago
KRASH: Reproducible CPU load generation on many-core machines
Abstract--In this article we present KRASH, a tool for reproducible generation of system-level CPU load. This tool is intended for use in shared memory machines equipped with multi...
Swann Perarnau, Guillaume Huard
142
Voted
MASS
2010
156views Communications» more  MASS 2010»
15 years 20 days ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
« Prev « First page 1455 / 1476 Last » Next »