Sciweavers

7065 search results - page 1231 / 1413
» Iterative Scheduling Algorithms
Sort
View
ESA
2004
Springer
139views Algorithms» more  ESA 2004»
15 years 10 months ago
Comparing Real Algebraic Numbers of Small Degree
We study polynomials of degree up to 4 over the rationals or a computable real subfield. Our motivation comes from the need to evaluate predicates in nonlinear computational geome...
Ioannis Z. Emiris, Elias P. Tsigaridas
FPL
2004
Springer
205views Hardware» more  FPL 2004»
15 years 10 months ago
A System Level Resource Estimation Tool for FPGAs
Abstract. High level modeling tools make it possible to synthesize a high performance FPGA design directly from a Simulink model. Accurate estimates of the FPGA resources required ...
Changchun Shi, James Hwang, Scott McMillan, Ann Ro...
ICBA
2004
Springer
224views Biometrics» more  ICBA 2004»
15 years 10 months ago
Matching 2.5D Scans for Face Recognition
Abstract. The performance of face recognition systems that use twodimensional images is dependent on consistent conditions such as lighting, pose, and facial appearance. We are dev...
Xiaoguang Lu, Dirk Colbry, Anil K. Jain
ICFEM
2004
Springer
15 years 10 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
15 years 10 months ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung
« Prev « First page 1231 / 1413 Last » Next »