Sciweavers

571 search results - page 70 / 115
» Performing causality analysis by bounded model checking
Sort
View
ICML
2008
IEEE
16 years 19 days ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 12 months ago
Error Analysis of Approximated PCRLBs for Nonlinear Dynamics
In practical nonlinear filtering, the assessment of achievable filtering performance is important. In this paper, we focus on the problem of how to efficiently approximate the post...
Ming Lei, Pierre Del Moral, Christophe Baehr
PLDI
2009
ACM
15 years 6 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 12 months ago
Efficient Approximation of Optimal Control for Markov Games
The success of probabilistic model checking for discrete-time Markov decision processes and continuous-time Markov chains has led to rich academic and industrial applications. The ...
Markus Rabe, Sven Schewe, Lijun Zhang
JAVA
2001
Springer
15 years 4 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...