• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,151
Next 10 →

Changes in Cerebello-motor Connectivity during Procedural Learning by Actual Execution and Observation

by Sara Torriero, Massimiliano Oliveri, Giacomo Koch, Emanuele Lo Gerfo, Silvia Salerno, Fabio Ferlazzo, Carlo Caltagirone, Laura Petrosini
"... ■ The cerebellum is involved in motor learning of new procedures both during actual execution of a motor task and during observational training. These processes are thought to depend on the activity of a neural network that involves the lateral cerebellum and primary motor cortex (M1). In this study ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
■ The cerebellum is involved in motor learning of new procedures both during actual execution of a motor task and during observational training. These processes are thought to depend on the activity of a neural network that involves the lateral cerebellum and primary motor cortex (M1

Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies

by Trosky B. Callo Arias - In Proceedings of the 2008 15th Working Conference on Reverse Engineering , 2008
"... In this paper, we present a dynamic analysis approach to increase the understandability of a large software-intensive system, more particularly to enable the iden-tification of dependencies between its execution enti-ties. This approach analyzes the execution of a soft-ware system in a top-down fash ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
In this paper, we present a dynamic analysis approach to increase the understandability of a large software-intensive system, more particularly to enable the iden-tification of dependencies between its execution enti-ties. This approach analyzes the execution of a soft-ware system in a top

Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes

by Mark E. Crovella, Azer Bestavros , 1996
"... Recently the notion of self-similarity has been shown to apply to wide-area and local-area network traffic. In this paper we examine the mechanisms that give rise to the self-similarity of network traffic. We present a hypothesized explanation for the possible self-similarity of traffic by using a p ..."
Abstract - Cited by 1416 (26 self) - Add to MetaCart
particular subset of wide area traffic: traffic due to the World Wide Web (WWW). Using an extensive set of traces of actual user executions of NCSA Mosaic, reflecting over half a million requests for WWW documents, we examine the dependence structure of WWW traffic. While our measurements are not conclusive

Model Checking for Programming Languages using VeriSoft

by Patrice Godefroid - IN PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES , 1997
"... Verification by state-space exploration, also often referred to as "model checking", is an effective method for analyzing the correctness of concurrent reactive systems (e.g., communication protocols). Unfortunately, existing model-checking techniques are restricted to the verification of ..."
Abstract - Cited by 446 (15 self) - Add to MetaCart
of properties of models, i.e., abstractions, of concurrent systems. In this paper, we discuss how model checking can be extended to deal directly with "actual" descriptions of concurrent systems, e.g., implementations of communication protocols written in programming languages such as C or C++. We

Intrusion Detection using Sequences of System Calls

by Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - Journal of Computer Security , 1998
"... A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs. Normal behavio ..."
Abstract - Cited by 396 (15 self) - Add to MetaCart
behavior is collected in two ways: Synthetically, by exercising as many normal modes of usage of a program as possible, and in a live user environment by tracing the actual execution of the program. In the former case several types of intrusive behavior were studied; in the latter case, results were

Workflow Mining: Discovering process models from event logs

by W.M.P. van der Aalst, A.J.M.M. Weijter, L. Maruster - IEEE Transactions on Knowledge and Data Engineering , 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract - Cited by 400 (57 self) - Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being

Characteristics of WWW Client-based Traces

by Carlos R. Cunha, Azer Bestavros, Mark E. Crovella , 1995
"... The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW docu ..."
Abstract - Cited by 313 (31 self) - Add to MetaCart
The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW

Simulating the power consumption of large-scale sensor network applications

by Victor Shnayder, Mark Hempstead, Bor-rong Chen, Geoff Werner Allen, Matt Welsh - In Sensys , 2004
"... Developing sensor network applications demands a new set of tools to aid programmers. A number of simulation environments have been developed that provide varying degrees of scalability, realism, and detail for understanding the behavior of sensor networks. To date, however, none of these tools have ..."
Abstract - Cited by 327 (4 self) - Add to MetaCart
to estimate the number of CPU cycles executed by each node, eliminating the need for expensive instruction-level simulation of sensor nodes. PowerTOSSIM includes a detailed model of hardware energy consumption based on the Mica2 sensor node platform. Through instrumentation of actual sensor nodes, we

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one

Is imitation learning the route to humanoid robots?

by Stefan Schaal - TRENDS IN COGNITIVE SCIENCES , 1999
"... This review investigates two recent developments in artificial intelligence and neural computation: learning from imitation and the development of humanoid robots. It is postulated that the study of imitation learning offers a promising route to gain new insights into mechanisms of perceptual motor ..."
Abstract - Cited by 308 (18 self) - Add to MetaCart
on representations of, and functional connections between, action and perception have contributed to our understanding of motor acts of other beings. The recent discovery that some areas in the primate brain are active during both movement perception and execution has provided a hypothetical neural basis
Next 10 →
Results 1 - 10 of 4,151
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University