Sciweavers

2230 search results - page 113 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
15 years 3 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
CVPR
2003
IEEE
15 years 11 months ago
Learning Bayesian Network Classifiers for Facial Expression Recognition using both Labeled and Unlabeled Data
Understanding human emotions is one of the necessary skills for the computer to interact intelligently with human users. The most expressive way humans display emotions is through...
Ira Cohen, Nicu Sebe, Fabio Gagliardi Cozman, Marc...
EAAI
2010
119views more  EAAI 2010»
14 years 8 months ago
A heuristic-based framework to solve a complex aircraft sizing problem
Aircraft sizing studies consist in determining the main characteristics of an aircraft starting from a set of requirements. These studies can be summarized as global constrained o...
Céline Badufle, Christophe Blondel, Thierry...
SSD
2007
Springer
116views Database» more  SSD 2007»
15 years 3 months ago
Continuous Constraint Query Evaluation for Spatiotemporal Streams
In this paper we study the evaluation of continuous constraint queries (CCQs) for spatiotemporal streams. A CCQ triggers an alert whenever a configuration of constraints between s...
Marios Hadjieleftheriou, Nikos Mamoulis, Yufei Tao
DSN
2003
IEEE
15 years 3 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...