Sciweavers

5722 search results - page 1137 / 1145
» Security Function Interactions
Sort
View
TSE
1998
176views more  TSE 1998»
14 years 11 months ago
Constructive Protocol Specification Using Cicero
—New protocols are often useful, but are hard to implement well. Protocol synthesis is a solution, but synthesized protocols can be slow. Implementing protocols will be even more...
Yen-Min Huang, Chinya V. Ravishankar
VLDB
1998
ACM
170views Database» more  VLDB 1998»
14 years 11 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...
PAMI
2007
186views more  PAMI 2007»
14 years 11 months ago
Value-Directed Human Behavior Analysis from Video Using Partially Observable Markov Decision Processes
—This paper presents a method for learning decision theoretic models of human behaviors from video data. Our system learns relationships between the movements of a person, the co...
Jesse Hoey, James J. Little
BRAIN
2010
Springer
14 years 10 months ago
Sparse Regression Models of Pain Perception
Discovering brain mechanisms underlying pain perception remains a challenging neuroscientific problem with important practical applications, such as developing better treatments f...
Irina Rish, Guillermo A. Cecchi, Marwan N. Baliki,...
INFOCOM
2010
IEEE
14 years 10 months ago
Socially-Aware Network Design Games
—In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wh...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
« Prev « First page 1137 / 1145 Last » Next »