Sciweavers

3555 search results - page 238 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
127
Voted
AUTOMATICA
2008
107views more  AUTOMATICA 2008»
15 years 5 months ago
Kalman filters in non-uniformly sampled multirate systems: For FDI and beyond
This paper consists of two parts. The first part is the development of a datadriven Kalman filter for a non-uniformly sampled multirate (NUSM) system, including identification of ...
Weihua Li, Sirish L. Shah, Deyun Xiao
EDBT
2010
ACM
145views Database» more  EDBT 2010»
15 years 8 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 5 months ago
Combining typing and size constraints for checking the termination of higher-order conditional rewrite systems
In a previous work, the first author extended to higher-order rewriting and dependent types the use of size annotations in types, a termination proof technique called type or size ...
Frédéric Blanqui, Colin Riba
TSMC
2002
80views more  TSMC 2002»
15 years 4 months ago
Performance metric alerting: a new design approach for complex alerting problems
Alerting systems and related decision-making automation are widely used to enhance the safety and capability of controlled processes across many applications. Traditional alerting ...
L. C. Yang, J. K. Kuchar
ICDM
2008
IEEE
107views Data Mining» more  ICDM 2008»
15 years 11 months ago
GeoDMA - A Novel System for Spatial Data Mining
Although a huge amount of remote sensing data has been provided by Earth observation satellites, few data manipulation techniques and information extraction in large data sets hav...
Thales Sehn Korting, Leila Maria Garcia Fonseca, M...