Sciweavers

4763 search results - page 77 / 953
» On the Execution of Deep Models
Sort
View
USENIX
2001
15 years 1 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
CAISE
2009
Springer
15 years 6 months ago
The Declarative Approach to Business Process Execution: An Empirical Test
Declarative approaches have been proposed to counter the limited flexibility of the traditional imperative modeling paradigm, but little empirical insights are available into thei...
Barbara Weber, Hajo A. Reijers, Stefan Zugal, Wern...
WSC
2008
15 years 2 months ago
Simulation of process execution monitoring and adjustment schemes
Optimization and design of production and service operations has been a cornerstone of simulation applications for many years. Recently there has been increasing interest in excel...
Russell R. Barton, Jun Shu
IJCAI
2001
15 years 1 months ago
On-Line Execution of cc-Golog Plans
Previously, the plan language cc-Golog was introduced for the purpose of specifying event-driven behavior typically found in robot controllers. So far, however, cc-Golog is usable...
Henrik Grosskreutz, Gerhard Lakemeyer
WSC
2007
15 years 2 months ago
Simulation assisted match-up rescheduling of flexible production systems subject to execution exceptions
An immense amount of research work has been done in the areas of scheduling and re-scheduling of various types of manufacturing systems. In this paper we present a simulation assi...
Wilhelm Dangelmaier, Kiran R. Mahajan, Mark Aufena...