A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Monitoring of Timing Constraints with Confidence Threshold Requirements
2007
IEEE transactions on computers
We propose an algorithm for monitoring timing constraints to satisfy confidence threshold requirements when there is uncertainty in the exact timing of event occurrences. ...
the confidence threshold of the timing constraint. ...
In this subsection, we design an efficient monitoring algorithm for a simple deadline timing constraint with a confidence threshold. ...
doi:10.1109/tc.2007.1026
fatcat:seddnhyrm5drlcob4elwvs6bbq
Monitoring of timing constraints with confidence threshold requirements
Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748)
We propose an algorithm for monitoring timing constraints to satisfy confidence threshold requirements when there is uncertainty in the exact timing of event occurrences. ...
the confidence threshold of the timing constraint. ...
In this subsection, we design an efficient monitoring algorithm for a simple deadline timing constraint with a confidence threshold. ...
doi:10.1109/real.2003.1253265
dblp:conf/rtss/LeeMK03
fatcat:3jarlwr3znckxeo6g3r35rfrwi
Compound Event Barrier Coverage in Wireless Sensor Networks under Multi-Constraint Conditions
2016
Sensors
The main objective of this paper is to design an efficient algorithm for complex conditions that can combine the compound event confidence. ...
It will be subject to multiple constraints under complex conditions in real-world applications. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s17010025
pmid:28029118
pmcid:PMC5298598
fatcat:vnt6tpqh7fhzxivl3nqxnnaxlq
A Note on Estimating Optimal Dynamic Treatment Strategies Under Resource Constraints Using Dynamic Marginal Structural Models
[article]
2019
arXiv
pre-print
We then apply this method to determine the optimal dynamic monitoring strategy for people living with HIV when resource limits on monitoring exist using observational data from the HIV-CAUSAL Collaboration ...
However, when a health system has resource constraints, such as limited funds, access to medication, or monitoring capabilities, medical decisions must balance impacts on both individual and population ...
Let: • t ∈ {0, . . . , K} denote time, assumed discrete, with K the end of the study; • N t be a variable indicating the whether an individual is monitored at time t; • Y denote health outcome we aim to ...
arXiv:1903.06488v1
fatcat:inneo7yocfbk5epjom4qjrhdd4
Prediction of Timing Constraint Violation for Real-Time Embedded Systems with Known Transient Hardware Failure Distribution Model
2006
2006 27th IEEE International Real-Time Systems Symposium (RTSS'06)
Our goal is to use the statistical transient failure models to calculate the earliest time at which we can predict, with a determined level of confidence, that a given timing constraint may be violated ...
We apply interval-based timing constraint satisfaction probability results to predict timing constraint violations in real-time embedded system with a known hardware transient failure model. ...
deadline constraint with a confidence threshold is given by: P with I d I c 2 1 : ≥ + + and an interval-based delay constraint with a confidence threshold is given by: P with I d I c 2 1 : < + − where ...
doi:10.1109/rtss.2006.33
dblp:conf/rtss/YuRF06
fatcat:ee5a7c2pibdwhn756stipwp4su
Automating the quality assurance of an on–line knowledge–based classifier by fusing multiple off–line classifiers
[chapter]
2006
Modern Information Processing
We address two problems in the lifecycle of a production classifier: the monitoring of its decisions quality and the updating of the classifier over time. ...
By attaching a confidence measure to each output of the fusion, we generate a distribution of the production classifier's quality. ...
Fusion of Non-nicotine users
(for threshold T1 = 0.2)
Table 3 : 3 Output of Fusion for High Confidence Threshold T1 (for non-nicotine users) Confidence Threshold T1
T=Product, W=0.2, d=7 0.987 ...
doi:10.1016/b978-044452075-3/50013-3
fatcat:5aflbofj5fgmtpyudb6vg54m2a
Data Auditor
2010
Proceedings of the VLDB Endowment
a given constraint or its associated parameters for better fit with the data, and 4) several demonstration scenarios. using real data sets. ...
Given a rule or an integrity constraint and a target relation, Data Auditor computes pattern tableaux, which concisely summarize subsets of the relation that (mostly) satisfy or (mostly) fail the constraint ...
For example, the first pattern has a confidence of 0.25 since it matches the four tuples with time=10:15, of which only one has num_responses > 0. ...
doi:10.14778/1920841.1921060
fatcat:5j4hd24rkvbbjefclwjyt5tlqy
Quality-driven evaluation of trigger conditions on streaming time series
2005
Proceedings of the 2005 ACM symposium on Applied computing - SAC '05
(2) minimize the load shedding given a response time limit and accuracy requirements; and (3) minimize one type of accuracy errors given a response time limit and without load shedding. ...
Three optimization algorithms, each under a different set of quality requirements, are developed in the framework: (1) minimize the response time given accuracy requirements and without load shedding; ...
ratios must not exceed the given thresholds, with enough confidence (the confidence is deduced from the prediction model). ...
doi:10.1145/1066677.1066807
dblp:conf/sac/GaoWW05
fatcat:gf3r5mo4zjfvxl2ujqxlgk3fce
Decision Confidence Assessment in Multi-Class Classification
2021
Sensors
This paper presents a novel approach to the assessment of decision confidence when multi-class recognition is concerned. ...
When many classification problems are considered, while eliminating human interaction with the system might be one goal, it is not the only possible option—lessening the workload of human experts can also ...
With the same requirements, for l 1 -based confidence, the confidence threshold t would be 0.02 with accuracy a of 0.67. ...
doi:10.3390/s21113834
fatcat:yf56o2xbrbdoxi3brapx2rzshi
Toward sophisticated detection with distributed triggers
2006
Proceedings of the 2006 SIGCOMM workshop on Mining network data - MineNet '06
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal events with minimal communication ...
After the detailed illustration of trigger extensions, we discuss approaches to build more general extensions to support a broad range of complex constraints. ...
We give some examples for detection schemes that may require checking non-linear threshold constraints, relative triggers, and so on. ...
doi:10.1145/1162678.1162684
dblp:conf/minenet/HuangGHJT06
fatcat:h7lindymnvbcrhnns6ju4p24fq
Probabilistic Recognition of Complex Event
[chapter]
2011
Lecture Notes in Computer Science
The first advantage of the proposed approach is the flexibility of the modeling of composite events with complex temporal constraints. ...
We conclude by comparing our algorithm with the state of the art and showing how the definition of event models and the probabilistic reasoning can influence the results of the real-time event recognition ...
The confidence of spatial constraints is obtained by multiplying the confidence of object attributes P (A(ξ(ω))|w) involved in the constraint with the probability of the constraint to be verified (Eq. ...
doi:10.1007/978-3-642-23968-7_13
fatcat:jcse6h53jnb63jifiz3qlyjcma
Generalized association rule mining with constraints
2012
Information Sciences
Generalized association rule mining with constraints / BARALIS E.; CAGLIERO L.; CERQUITELLI T.; GARZA P. ...
Besides the traditional support and confidence constraints, two further constraints are enforced: (i) schema constraints and (ii) the opportunistic confidence constraint. ...
confidence constraint decreases.We also separately analyzed the execution time of the steps of the mining activity (i.e., itemset mining constrained by the minimum support threshold and schema constraints ...
doi:10.1016/j.ins.2011.05.016
fatcat:3jbhwrxenncgvoquq6l7g2ccwm
Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems
2017
ACM Transactions on Embedded Computing Systems
Since our TTL monitoring logic evaluates the timing constraints using only the timestamps of the required events on the signal, the TTL monitoring logic has significantly less memory footprint when compared ...
Timing constraints for CPS, which can be large and complex systems, are often associated with tolerances, the expression of which can make the timing constraints even more cumbersome using STL. ...
The mention of commercial products in this paper is for illustration purposes only and does not imply recommendation or endorsement by the National Institute of Standards and Technology (NIST). ...
doi:10.1145/3126510
fatcat:q6a4l3z5obgizmybah6jwhmisq
Expanding Access to HIV Viral Load Testing: A Systematic Review of RNA Stability in EDTA Tubes and PPT beyond Current Time and Temperature Thresholds
2014
PLoS ONE
RNA Stability in EDTA Tubes and PPT beyond Current Time and Temperature Thresholds. ...
For EDTA plasma stored at 30˚C, stability was maintained up to 48 hours (95% confidence), with OLS linear regression estimates up to 127 hours, suggesting stability. ...
For EDTA whole blood transport, RNA remains stable until 72 hours, with data points at times beyond 72 hours suggesting stability, but with 95% confidence intervals that spanned the stability threshold ...
doi:10.1371/journal.pone.0113813
pmid:25437009
pmcid:PMC4249975
fatcat:uvirle2c2fbtnngnzi74k4kmqm
Personalised e-learning opportunities - call for a pedagogical domain knowledge model
2004
Proceedings. 15th International Workshop on Database and Expert Systems Applications, 2004.
These platforms keep track of learners' activities including content viewed, time spent and quiz results. ...
This includes educational thresholds, constraints, taxonomies and previously discovered knowledge as well as pedagogical interestingness and metrics. ...
Typical examples of algorithm-dependent thresholds are minima and maxima of support, confidence and coverage. Whist almost all thresholds are domain-agnostic, their settings are contextsensitive. ...
doi:10.1109/dexa.2004.1333508
dblp:conf/dexaw/BuchnerP04
fatcat:4y4kdstdrndxppf6dcr32dajwq
« Previous
Showing results 1 — 15 out of 109,081 results