Sciweavers

2826 search results - page 360 / 566
» A resource-based analysis of IT sourcing
Sort
View
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 8 months ago
opaal: A Lattice Model Checker
Abstract. We present a new open source model checker, opaal, for automatic verification of models using lattice automata. Lattice automata allow the users to incorporate abstracti...
Andreas Engelbredt Dalsgaard, René Rydhof H...
142
Voted
JDCTA
2010
111views more  JDCTA 2010»
14 years 8 months ago
A Conceptual Representation of Consumer's Group Knowledge and the Possible Role of New Technologies
The purpose of this article is to encourage research on the aspects of consumer behaviour, particularly as found in groups of consumers. For both researchers and practitioners, co...
Massimo Franco, Francesca Di Virgilio, Loredana Di...
119
Voted
ICASSP
2011
IEEE
14 years 5 months ago
An extension of the ICA model using latent variables
The Independent Component Analysis (ICA) model is extended to the case where the components are not necessarily independent: depending on the value a hidden latent process at the ...
Selwa Rafi, Marc Castella, Wojciech Pieczynski
CASC
2011
Springer
262views Mathematics» more  CASC 2011»
14 years 1 months ago
Practical Divide-and-Conquer Algorithms for Polynomial Arithmetic
We investigate two practical divide-and-conquer style algorithms for univariate polynomial arithmetic. First we revisit an algorithm originally described by Brent and Kung for comp...
William Hart, Andrew Novocin
EGOV
2011
Springer
14 years 1 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson