نتایج جستجو برای: automated methods
تعداد نتایج: 1974455 فیلتر نتایج به سال:
The computational challenge of automating outlier, or blunder point, detection in radio metric data requires the use of nonstandard statistical methods because the outliers have a deleterious effect upon standard least squares methods. The particular nonstandard methods most applicable to the task are the robust statistical techniques that have undergone intense development since the 1960s. The...
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert security knowledge, changes to IDSs are expensive and require many hours of programming and debugging. We describe a data mining framework for adaptively building Intrusion Detection (ID...
A compiler approach for generating low-level computer code from high-level input for discontinuous Galerkin finite element forms is presented. The input language mirrors conventional mathematical notation, and the compiler generates efficient code in a standard programming language. This facilitates the rapid generation of efficient code for general equations in varying spatial dimensions. Key ...
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants to keep secret. Existing software model checking tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. We ...
Systems supporting the manipulation of non-trivial program code are complex and are at best semi-automatic. However, formal methods, and in partieular theorem proving, are providing a growing foundation of techniques for automatie program development (synthesis, improvement, transformation and verification). In this paper we report on novel research concerning: (1) the exploitation of synthesis...
In this paper, an overview of state-of-the-art approaches for speaker recognition is presented. Due to the increased scalar of dialogue system applications the interest in that province has grown boomingly in certain years. Nevertheless, there are many open up shots in the field of automatic speaker recognition. The techniques, evaluations, and implementations of various proposed speaker recogn...
Automatic focusing of microscope images is an essential part of modern high-throughput microscopy. This chapter describes implementation of a robust autofocus system appropriate for using either air or oil immersion objectives in robotic imaging. Both hardware and software algorithms are described, and caveats of using viscous immersion media with multifield scanning are detailed.
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
since its introduction in 1959, translation quality assessment (tqa) has been among the most addressed research topics in translation studies. during recent years, there has been a crucial increase on the study of tqa. various methods have come on scene. although these methods are based on scientific theories, most of them have remained at the level of theory. juliane house’s model is among tho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید