Sciweavers

1704 search results - page 94 / 341
» Modeling virtualized applications using machine learning tec...
Sort
View
137
Voted
CCS
2008
ACM
15 years 4 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
116
Voted
HPDC
2010
IEEE
15 years 3 months ago
Cloud computing paradigms for pleasingly parallel biomedical applications
Cloud computing offers new approaches for scientific computing that leverage the major commercial hardware and software investment in this area. Closely coupled applications are s...
Thilina Gunarathne, Tak-Lon Wu, Judy Qiu, Geoffrey...
133
Voted
ATAL
2008
Springer
15 years 4 months ago
Simulation of individual spontaneous reactive behavior
The context of this work is the search for realism and believability of Virtual Humans. Our contribution to achieve this goal is to enable Virtual Humans (VH) to react to spontane...
Alejandra García-Rojas, Mario Gutiér...
113
Voted
NIPS
2001
15 years 4 months ago
Adaptive Sparseness Using Jeffreys Prior
In this paper we introduce a new sparseness inducing prior which does not involve any (hyper)parameters that need to be adjusted or estimated. Although other applications are poss...
Mário A. T. Figueiredo
132
Voted
TPHOL
2007
IEEE
15 years 9 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao