Sciweavers

2061 search results - page 99 / 413
» Authorization for Metacomputing Applications
Sort
View
106
Voted
SAC
2008
ACM
15 years 2 days ago
Local linear regression with adaptive orthogonal fitting for the wind power application
For short-term forecasting of wind generation, a necessary step is to model the function for the conversion of meteorological variables (mainly wind speed) to power production. Su...
Pierre Pinson, Henrik Aalborg Nielsen, Henrik Mads...
192
Voted
ICDE
2007
IEEE
133views Database» more  ICDE 2007»
16 years 2 months ago
Programming Patterns for Architecture-Level Software Optimizations on Frequent Pattern Mining
One very important application in the data mining domain is frequent pattern mining. Various authors have worked on improving the efficiency of this computation, mostly focusing o...
Mingliang Wei, Changhao Jiang, Marc Snir
ACMSE
2006
ACM
15 years 6 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
104
Voted
SAFECOMP
2010
Springer
14 years 10 months ago
Experiences in Applying Formal Verification in Robotics
Formal verification efforts in the area of robotics are still comparatively scarce. In this paper we report on our experiences with one such effort, which was concerned with design...
Dennis Walter, Holger Täubig, Christoph L&uum...
144
Voted
CSCW
2011
ACM
14 years 7 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill