Sciweavers

1453 search results - page 212 / 291
» State and history in operating systems
Sort
View
89
Voted
ESANN
2007
15 years 2 months ago
An overview of reservoir computing: theory, applications and implementations
Training recurrent neural networks is hard. Recently it has however been discovered that it is possible to just construct a random recurrent topology, and only train a single linea...
Benjamin Schrauwen, David Verstraeten, Jan M. Van ...
79
Voted
WSC
2000
15 years 1 months ago
Virtual machines for message based, real-time and interactive simulation
An advanced processing machine interacts with the material handling system, personnel and cell or shop floor controller in real-time via messaging and control. However, current si...
Hansoo Kim, Chen Zhou, Hua X. Du
CACM
2010
113views more  CACM 2010»
15 years 21 days ago
Reasoning about the unknown in static analysis
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated as ...
Isil Dillig, Thomas Dillig, Alex Aiken
115
Voted
DKE
2007
115views more  DKE 2007»
15 years 16 days ago
Business process management: Where business processes and web services meet
Abstract. Business Process Management (BPM) includes methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. Th...
Wil M. P. van der Aalst, Boualem Benatallah, Fabio...
IJDE
2007
105views more  IJDE 2007»
15 years 15 days ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka