109,081 Hits in 6.7 sec

Monitoring of Timing Constraints with Confidence Threshold Requirements

Chan-gun Lee, Aloysius K. Mok, Prabhudev Konana
2007 IEEE transactions on computers  
We propose an algorithm for monitoring timing constraints to satisfy confidence threshold requirements when there is uncertainty in the exact timing of event occurrences.  ...  the confidence threshold of the timing constraint.  ...  In this subsection, we design an efficient monitoring algorithm for a simple deadline timing constraint with a confidence threshold.  ... 
doi:10.1109/tc.2007.1026 fatcat:seddnhyrm5drlcob4elwvs6bbq

Monitoring of timing constraints with confidence threshold requirements

Chan-Gun Lee, A.K. Mok, P. Konana
Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748)  
We propose an algorithm for monitoring timing constraints to satisfy confidence threshold requirements when there is uncertainty in the exact timing of event occurrences.  ...  the confidence threshold of the timing constraint.  ...  In this subsection, we design an efficient monitoring algorithm for a simple deadline timing constraint with a confidence threshold.  ... 
doi:10.1109/real.2003.1253265 dblp:conf/rtss/LeeMK03 fatcat:3jarlwr3znckxeo6g3r35rfrwi

Compound Event Barrier Coverage in Wireless Sensor Networks under Multi-Constraint Conditions

Yaoming Zhuang, Chengdong Wu, Yunzhou Zhang, Zixi Jia
2016 Sensors  
The main objective of this paper is to design an efficient algorithm for complex conditions that can combine the compound event confidence.  ...  It will be subject to multiple constraints under complex conditions in real-world applications.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s17010025 pmid:28029118 pmcid:PMC5298598 fatcat:vnt6tpqh7fhzxivl3nqxnnaxlq

A Note on Estimating Optimal Dynamic Treatment Strategies Under Resource Constraints Using Dynamic Marginal Structural Models [article]

Ellen C Caniglia, Eleanor J Murray, Miguel A Hernan, Zach Shahn
2019 arXiv   pre-print
We then apply this method to determine the optimal dynamic monitoring strategy for people living with HIV when resource limits on monitoring exist using observational data from the HIV-CAUSAL Collaboration  ...  However, when a health system has resource constraints, such as limited funds, access to medication, or monitoring capabilities, medical decisions must balance impacts on both individual and population  ...  Let: • t ∈ {0, . . . , K} denote time, assumed discrete, with K the end of the study; • N t be a variable indicating the whether an individual is monitored at time t; • Y denote health outcome we aim to  ... 
arXiv:1903.06488v1 fatcat:inneo7yocfbk5epjom4qjrhdd4

Prediction of Timing Constraint Violation for Real-Time Embedded Systems with Known Transient Hardware Failure Distribution Model

Yue Yu, Shangping Ren, Ophir Frieder
2006 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06)  
Our goal is to use the statistical transient failure models to calculate the earliest time at which we can predict, with a determined level of confidence, that a given timing constraint may be violated  ...  We apply interval-based timing constraint satisfaction probability results to predict timing constraint violations in real-time embedded system with a known hardware transient failure model.  ...  deadline constraint with a confidence threshold is given by: P with I d I c 2 1 : ≥ + + and an interval-based delay constraint with a confidence threshold is given by: P with I d I c 2 1 : < + − where  ... 
doi:10.1109/rtss.2006.33 dblp:conf/rtss/YuRF06 fatcat:ee5a7c2pibdwhn756stipwp4su

Automating the quality assurance of an on–line knowledge–based classifier by fusing multiple off–line classifiers [chapter]

Piero P. Bonissone
2006 Modern Information Processing  
We address two problems in the lifecycle of a production classifier: the monitoring of its decisions quality and the updating of the classifier over time.  ...  By attaching a confidence measure to each output of the fusion, we generate a distribution of the production classifier's quality.  ...  Fusion of Non-nicotine users (for threshold T1 = 0.2) Table 3 : 3 Output of Fusion for High Confidence Threshold T1 (for non-nicotine users) Confidence Threshold T1 T=Product, W=0.2, d=7 0.987  ... 
doi:10.1016/b978-044452075-3/50013-3 fatcat:5aflbofj5fgmtpyudb6vg54m2a

Data Auditor

Lukasz Golab, Howard Karloff, Flip Korn, Divesh Srivastava
2010 Proceedings of the VLDB Endowment  
a given constraint or its associated parameters for better fit with the data, and 4) several demonstration scenarios. using real data sets.  ...  Given a rule or an integrity constraint and a target relation, Data Auditor computes pattern tableaux, which concisely summarize subsets of the relation that (mostly) satisfy or (mostly) fail the constraint  ...  For example, the first pattern has a confidence of 0.25 since it matches the four tuples with time=10:15, of which only one has num_responses > 0.  ... 
doi:10.14778/1920841.1921060 fatcat:5j4hd24rkvbbjefclwjyt5tlqy

Quality-driven evaluation of trigger conditions on streaming time series

Like Gao, Min Wang, X. Sean Wang
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
(2) minimize the load shedding given a response time limit and accuracy requirements; and (3) minimize one type of accuracy errors given a response time limit and without load shedding.  ...  Three optimization algorithms, each under a different set of quality requirements, are developed in the framework: (1) minimize the response time given accuracy requirements and without load shedding;  ...  ratios must not exceed the given thresholds, with enough confidence (the confidence is deduced from the prediction model).  ... 
doi:10.1145/1066677.1066807 dblp:conf/sac/GaoWW05 fatcat:gf3r5mo4zjfvxl2ujqxlgk3fce

Decision Confidence Assessment in Multi-Class Classification

Michał Bukowski, Jarosław Kurek, Izabella Antoniuk, Albina Jegorowa
2021 Sensors  
This paper presents a novel approach to the assessment of decision confidence when multi-class recognition is concerned.  ...  When many classification problems are considered, while eliminating human interaction with the system might be one goal, it is not the only possible option—lessening the workload of human experts can also  ...  With the same requirements, for l 1 -based confidence, the confidence threshold t would be 0.02 with accuracy a of 0.67.  ... 
doi:10.3390/s21113834 fatcat:yf56o2xbrbdoxi3brapx2rzshi

Toward sophisticated detection with distributed triggers

Ling Huang, Minos Garofalakis, Joseph Hellerstein, Anthony Joseph, Nina Taft
2006 Proceedings of the 2006 SIGCOMM workshop on Mining network data - MineNet '06  
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal events with minimal communication  ...  After the detailed illustration of trigger extensions, we discuss approaches to build more general extensions to support a broad range of complex constraints.  ...  We give some examples for detection schemes that may require checking non-linear threshold constraints, relative triggers, and so on.  ... 
doi:10.1145/1162678.1162684 dblp:conf/minenet/HuangGHJT06 fatcat:h7lindymnvbcrhnns6ju4p24fq

Probabilistic Recognition of Complex Event [chapter]

Rim Romdhane, Bernard Boulay, Francois Bremond, Monique Thonnat
2011 Lecture Notes in Computer Science  
The first advantage of the proposed approach is the flexibility of the modeling of composite events with complex temporal constraints.  ...  We conclude by comparing our algorithm with the state of the art and showing how the definition of event models and the probabilistic reasoning can influence the results of the real-time event recognition  ...  The confidence of spatial constraints is obtained by multiplying the confidence of object attributes P (A(ξ(ω))|w) involved in the constraint with the probability of the constraint to be verified (Eq.  ... 
doi:10.1007/978-3-642-23968-7_13 fatcat:jcse6h53jnb63jifiz3qlyjcma

Generalized association rule mining with constraints

Elena Baralis, Luca Cagliero, Tania Cerquitelli, Paolo Garza
2012 Information Sciences  
Generalized association rule mining with constraints / BARALIS E.; CAGLIERO L.; CERQUITELLI T.; GARZA P.  ...  Besides the traditional support and confidence constraints, two further constraints are enforced: (i) schema constraints and (ii) the opportunistic confidence constraint.  ...  confidence constraint decreases.We also separately analyzed the execution time of the steps of the mining activity (i.e., itemset mining constrained by the minimum support threshold and schema constraints  ... 
doi:10.1016/j.ins.2011.05.016 fatcat:3jbhwrxenncgvoquq6l7g2ccwm

Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems

Mohammadreza Mehrabian, Kevin Stanton, Mohammad Khayatian, Aviral Shrivastava, John C. Eidson, Patricia Derler, Hugo A. Andrade, Ya-Shian Li-Baboud, Edward Griffor, Marc Weiss
2017 ACM Transactions on Embedded Computing Systems  
Since our TTL monitoring logic evaluates the timing constraints using only the timestamps of the required events on the signal, the TTL monitoring logic has significantly less memory footprint when compared  ...  Timing constraints for CPS, which can be large and complex systems, are often associated with tolerances, the expression of which can make the timing constraints even more cumbersome using STL.  ...  The mention of commercial products in this paper is for illustration purposes only and does not imply recommendation or endorsement by the National Institute of Standards and Technology (NIST).  ... 
doi:10.1145/3126510 fatcat:q6a4l3z5obgizmybah6jwhmisq

Expanding Access to HIV Viral Load Testing: A Systematic Review of RNA Stability in EDTA Tubes and PPT beyond Current Time and Temperature Thresholds

Kimberly Bonner, Reed A. Siemieniuk, Andrew Boozary, Teri Roberts, Emmanuel Fajardo, Jennifer Cohn, Mark J. Siedner
2014 PLoS ONE  
RNA Stability in EDTA Tubes and PPT beyond Current Time and Temperature Thresholds.  ...  For EDTA plasma stored at 30˚C, stability was maintained up to 48 hours (95% confidence), with OLS linear regression estimates up to 127 hours, suggesting stability.  ...  For EDTA whole blood transport, RNA remains stable until 72 hours, with data points at times beyond 72 hours suggesting stability, but with 95% confidence intervals that spanned the stability threshold  ... 
doi:10.1371/journal.pone.0113813 pmid:25437009 pmcid:PMC4249975 fatcat:uvirle2c2fbtnngnzi74k4kmqm

Personalised e-learning opportunities - call for a pedagogical domain knowledge model

A.G. Buchner, D. Patterson
2004 Proceedings. 15th International Workshop on Database and Expert Systems Applications, 2004.  
These platforms keep track of learners' activities including content viewed, time spent and quiz results.  ...  This includes educational thresholds, constraints, taxonomies and previously discovered knowledge as well as pedagogical interestingness and metrics.  ...  Typical examples of algorithm-dependent thresholds are minima and maxima of support, confidence and coverage. Whist almost all thresholds are domain-agnostic, their settings are contextsensitive.  ... 
doi:10.1109/dexa.2004.1333508 dblp:conf/dexaw/BuchnerP04 fatcat:4y4kdstdrndxppf6dcr32dajwq
« Previous Showing results 1 — 15 out of 109,081 results