Sciweavers

8647 search results - page 386 / 1730
» The Container Selection Problem
Sort
View
IPCCC
2006
IEEE
15 years 10 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
ICCAD
1994
IEEE
65views Hardware» more  ICCAD 1994»
15 years 9 months ago
Incremental formal design verification
Language containment is a method for design verification that involves checking if the behavior of the system to be verified is a subset of the behavior of the specifications (pro...
Gitanjali Swamy, Robert K. Brayton
136
Voted
JMLR
2006
145views more  JMLR 2006»
15 years 4 months ago
Ensemble Pruning Via Semi-definite Programming
An ensemble is a group of learning models that jointly solve a problem. However, the ensembles generated by existing techniques are sometimes unnecessarily large, which can lead t...
Yi Zhang 0006, Samuel Burer, W. Nick Street
SCIA
2007
Springer
122views Image Analysis» more  SCIA 2007»
15 years 11 months ago
Individual Discriminative Face Recognition Models Based on Subsets of Features
Abstract. The accuracy of data classification methods depends considerably on the data representation and on the selected features. In this work, the elastic net model selection i...
Line Harder Clemmensen, David Delgado Gomez, Bjarn...
NETWORKING
2010
15 years 6 months ago
Toward Efficient On-Demand Streaming with BitTorrent
This paper considers the problem of adapting the BitTorrent protocol for on-demand streaming. BitTorrent is a popular peer-to-peer file sharing protocol that efficiently accommodat...
Youmna Borghol, Sebastien Ardon, Niklas Carlsson, ...