Sciweavers

10055 search results - page 1646 / 2011
» Structured programming using processes
Sort
View
CCS
2007
ACM
15 years 9 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
ICPR
2000
IEEE
16 years 4 months ago
Mixture Densities for Video Objects Recognition
The appearance of non-rigid objects detected and tracked in video streams is highly variable and therefore makes the identification of similar objects very complex. Furthermore, i...
Riad I. Hammoud, Roger Mohr
ICML
2003
IEEE
16 years 4 months ago
On Kernel Methods for Relational Learning
Kernel methods have gained a great deal of popularity in the machine learning community as a method to learn indirectly in highdimensional feature spaces. Those interested in rela...
Chad M. Cumby, Dan Roth
CAV
2009
Springer
182views Hardware» more  CAV 2009»
15 years 10 months ago
Generalizing DPLL to Richer Logics
The DPLL approach to the Boolean satisfiability problem (SAT) is a combination of search for a satisfying assignment and logical deduction, in which each process guides the other....
Kenneth L. McMillan, Andreas Kuehlmann, Mooly Sagi...
CSE
2009
IEEE
15 years 10 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
« Prev « First page 1646 / 2011 Last » Next »