Sciweavers

21319 search results - page 221 / 4264
» An Approach for Method Reengineering
Sort
View
APSEC
2004
IEEE
15 years 8 months ago
Comparison of Scenario-Based Software Architecture Evaluation Methods
Software engineering community has proposed several methods to evaluate software architectures with respect to desired quality attributes such as maintainability, performance, and...
Muhammad Ali Babar, Ian Gorton
EOR
2010
160views more  EOR 2010»
15 years 4 months ago
A modified alternating direction method for convex quadratically constrained quadratic semidefinite programs
We propose a modified alternate direction method for solving convex quadratically constrained quadratic semidefinite optimization problems. The method is a first-order method, the...
Jie Sun, Su Zhang
JMLR
2010
128views more  JMLR 2010»
15 years 2 months ago
Iterative Scaling and Coordinate Descent Methods for Maximum Entropy Models
Maximum entropy (Maxent) is useful in natural language processing and many other areas. Iterative scaling (IS) methods are one of the most popular approaches to solve Maxent. With...
Fang-Lan Huang, Cho-Jui Hsieh, Kai-Wei Chang, Chih...
ISBI
2004
IEEE
16 years 5 months ago
Clustering-Based Framework for Comparing fMRI Analysis Methods
In this paper, a cluster-based framework is introduced for comparing analysis methods of functional magnetic resonance images (fMRI). In the proposed framework, fMRI data is repla...
Hamid Soltanian-Zadeh, Gholam-Ali Hossein-Zadeh, A...
EDBT
2008
ACM
124views Database» more  EDBT 2008»
16 years 4 months ago
An efficient clustering method for k-anonymization
The k-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is cruci...
Jun-Lin Lin, Meng-Cheng Wei