Sciweavers

5722 search results - page 951 / 1145
» Security Function Interactions
Sort
View
129
Voted
DAC
1998
ACM
16 years 4 months ago
Rate Derivation and Its Applications to Reactive, Real-Time Embedded Systems
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
Ali Dasdan, Dinesh Ramanathan, Rajesh K. Gupta
125
Voted
MICCAI
2005
Springer
16 years 4 months ago
Segmentation of Neighboring Organs in Medical Image with Model Competition
Abstract. This paper presents a novel approach for image segmentation by introducing competition between neighboring shape models. Our method is motivated by the observation that e...
Pingkun Yan, Weijia Shen, Ashraf A. Kassim, Mubara...
143
Voted
ICML
2006
IEEE
16 years 4 months ago
An analytic solution to discrete Bayesian reinforcement learning
Reinforcement learning (RL) was originally proposed as a framework to allow agents to learn in an online fashion as they interact with their environment. Existing RL algorithms co...
Pascal Poupart, Nikos A. Vlassis, Jesse Hoey, Kevi...
ICSE
2009
IEEE-ACM
16 years 4 months ago
FlexSync: An aspect-oriented approach to Java synchronization
Designers of concurrent programs are faced with many choices of synchronization mechanisms, among which clear functional trade-offs exist. Making synchronization customizable is h...
Charles Zhang
115
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Tool support for data validation by end-user programmers
End-user programming tools for creating spreadsheets and webforms offer no data types except "string" for storing many kinds of data, such as person names and street add...
Christopher Scaffidi, Brad A. Myers, Mary Shaw