Sciweavers

317 search results - page 8 / 64
» Typing References by Effect Inference
Sort
View
IFL
2003
Springer
159views Formal Methods» more  IFL 2003»
15 years 2 months ago
Inferring Cost Equations for Recursive, Polymorphic and Higher-Order Functional Programs
Abstract This paper presents a type-based analysis for inferring sizeand cost-equations for recursive, higher-order and polymorphic functional programs without requiring user annot...
Pedro B. Vasconcelos, Kevin Hammond
77
Voted
BIRD
2007
Springer
118views Bioinformatics» more  BIRD 2007»
15 years 1 months ago
Biological Network Inference Using Redundancy Analysis
The paper presents MRNet, an original method for inferring genetic networks from microarray data. This method is based on maximum relevance/minimum redundancy (MRMR), an effective ...
Patrick Emmanuel Meyer, Kevin Kontos, Gianluca Bon...
IDEAL
2010
Springer
14 years 8 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
AROBOTS
2005
55views more  AROBOTS 2005»
14 years 9 months ago
Nonlinear Control for the Dual Smart Drive Using Backstepping and a Time-Optimal Reference
The Dual Smart Drive is a specially designed nonlinear actuator intended for use in climbing and walking legged robots. It features a continuously changing transmission ratio and d...
Roemi Fernández, João Pedro Hespanha...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
15 years 11 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu