Sciweavers

1359 search results - page 211 / 272
» Probabilistic Points-to Analysis
Sort
View
106
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
QEST
2006
IEEE
15 years 6 months ago
Safe On-The-Fly Steady-State Detection for Time-Bounded Reachability
The time-bounded reachability problem for continuoustime Markov chains (CTMCs) amounts to determine the probability to reach a (set of) goal state(s) within a given time span, suc...
Joost-Pieter Katoen, Ivan S. Zapreev
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 6 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
DATE
2005
IEEE
147views Hardware» more  DATE 2005»
15 years 6 months ago
Buffer Insertion Considering Process Variation
A comprehensive probabilistic methodology is proposed to solve the buffer insertion problem with the consideration of process variations. In contrast to a recent work, we point o...
Jinjun Xiong, King Ho Tam, Lei He
MLDM
2005
Springer
15 years 6 months ago
Unsupervised Learning of Visual Feature Hierarchies
We propose an unsupervised, probabilistic method for learning visual feature hierarchies. Starting from local, low-level features computed at interest point locations, the method c...
Fabien Scalzo, Justus H. Piater