Sciweavers

884 search results - page 102 / 177
» Linear-Input Subset Analysis
Sort
View
ESSOS
2010
Springer
16 years 1 days ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
IWANN
2009
Springer
15 years 9 months ago
Feature Selection in Survival Least Squares Support Vector Machines with Maximal Variation Constraints
This work proposes the use of maximal variation analysis for feature selection within least squares support vector machines for survival analysis. Instead of selecting a subset of ...
Vanya Van Belle, Kristiaan Pelckmans, Johan A. K. ...
ACSAC
2008
IEEE
15 years 9 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
15 years 9 months ago
Information-optimal selective data return for autonomous rover traverse science and survey
— Selective data return leverages onboard data analysis to allocate limited bandwidth resources during remote exploration. Here we present an adaptive method to subsample image s...
David R. Thompson, Trey Smith, David Wettergreen
ICSM
2008
IEEE
15 years 9 months ago
AutoFlow: An automatic debugging tool for AspectJ software
Aspect-oriented programming (AOP) is gaining popularity with the wider adoption of languages such as AspectJ. During AspectJ software evolution, when regression tests fail, it may...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao