Sciweavers

1875 search results - page 151 / 375
» Kernel Methods for Pattern Analysis
Sort
View
KDD
1998
ACM
141views Data Mining» more  KDD 1998»
15 years 4 months ago
Rule Discovery from Time Series
We consider the problem of nding rules relating patterns in a time series to other patterns in that series, or patterns in one series to patterns in another series. A simple examp...
Gautam Das, King-Ip Lin, Heikki Mannila, Gopal Ren...
87
Voted
SMI
2008
IEEE
127views Image Analysis» more  SMI 2008»
15 years 7 months ago
Optimal bandwidth selection for MLS surfaces
We address the problem of bandwidth selection in MLS surfaces. While the problem has received relatively little attention in the literature, we show that appropriate selection pla...
Hao Wang, Carlos Eduardo Scheidegger, Cláud...
110
Voted
ICPADS
2006
IEEE
15 years 6 months ago
Flexible, Low-overhead Event Logging to Support Resource Scheduling
Flexible resource management and scheduling policies require detailed system-state information. Traditional, monolithic operating systems with a centralized kernel derive the requ...
Jan Stoess, Volkmar Uhlig
81
Voted
IJCAI
2007
15 years 2 months ago
A Factor Graph Model for Software Bug Finding
Automatic tools for finding software errors require knowledge of the rules a program must obey, or “specifications,” before they can identify bugs. We present a method that ...
Ted Kremenek, Andrew Y. Ng, Dawson R. Engler
97
Voted
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 9 days ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler