Sciweavers

773 search results - page 101 / 155
» Kernel Change-point Analysis
Sort
View
SMI
2008
IEEE
127views Image Analysis» more  SMI 2008»
15 years 4 months ago
Optimal bandwidth selection for MLS surfaces
We address the problem of bandwidth selection in MLS surfaces. While the problem has received relatively little attention in the literature, we show that appropriate selection pla...
Hao Wang, Carlos Eduardo Scheidegger, Cláud...
ICPADS
2006
IEEE
15 years 3 months ago
Flexible, Low-overhead Event Logging to Support Resource Scheduling
Flexible resource management and scheduling policies require detailed system-state information. Traditional, monolithic operating systems with a centralized kernel derive the requ...
Jan Stoess, Volkmar Uhlig
IJCAI
2007
14 years 11 months ago
A Factor Graph Model for Software Bug Finding
Automatic tools for finding software errors require knowledge of the rules a program must obey, or “specifications,” before they can identify bugs. We present a method that ...
Ted Kremenek, Andrew Y. Ng, Dawson R. Engler
BIOSYSTEMS
2008
84views more  BIOSYSTEMS 2008»
14 years 10 months ago
Decoding spike timing: The differential reverse-correlation method
It is widely acknowledged that detailed timing of action potentials is used to encode information, for example, in auditory pathways; however, the computational tools required to ...
Gasper Tkacik, Marcelo O. Magnasco
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
14 years 9 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler