Sciweavers

692 search results - page 86 / 139
» Understanding Finiteness Analysis Using Abstract Interpretat...
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 4 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
NIPS
1997
15 years 1 months ago
Learning Generative Models with the Up-Propagation Algorithm
Up-propagation is an algorithm for inverting and learning neural network generative models. Sensory input is processed by inverting a model that generates patterns from hidden var...
Jong-Hoon Oh, H. Sebastian Seung
BMCBI
2008
121views more  BMCBI 2008»
14 years 12 months ago
Modularization of biochemical networks based on classification of Petri net t-invariants
Background: Structural analysis of biochemical networks is a growing field in bioinformatics and systems biology. The availability of an increasing amount of biological data from ...
Eva Grafahrend-Belau, Falk Schreiber, Monika Heine...
PAA
2008
14 years 11 months ago
Human action recognition in videos based on the Transferable Belief Model
Abstract This paper focuses on human behavior recognition where the main problem is to bridge the semantic gap between the analogue observations of the real world and the symbolic ...
Emmanuel Ramasso, Costas Panagiotakis, Denis Pelle...
CGO
2007
IEEE
15 years 6 months ago
Run-Time Support for Optimizations Based on Escape Analysis
The JavaTM programming language does not allow the programmer to influence memory management. An object is usually allocated on the heap and deallocated by the garbage collector ...
Thomas Kotzmann, Hanspeter Mössenböck