Sciweavers

1712 search results - page 341 / 343
» A Computational Approach to Binding Theory
Sort
View
MA
2010
Springer
135views Communications» more  MA 2010»
14 years 10 months ago
Nonparametric comparison of regression functions
In this work we provide a new methodology for comparing regression functions m1 and m2 from two samples. Since apart from smoothness no other (parametric) assumptions are required...
Ramidha Srihera, Winfried Stute
SIAMSC
2010
130views more  SIAMSC 2010»
14 years 10 months ago
First-Order System Least Squares for Incompressible Resistive Magnetohydrodynamics
Magnetohydrodynamics (MHD) is a fluid theory that describes Plasma Physics by treating the plasma as a fluid of charged particles. Hence, the equations that describe the plasma f...
J. H. Adler, Thomas A. Manteuffel, Stephen F. McCo...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 9 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
SOCIALCOM
2010
14 years 9 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
CORR
2009
Springer
242views Education» more  CORR 2009»
14 years 9 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...