Sciweavers

5864 search results - page 155 / 1173
» Can We Work around Numerical Methods
Sort
View
SIGIR
2011
ACM
14 years 7 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
AOSD
2009
ACM
15 years 8 months ago
The dataflow pointcut: a formal and practical framework
Some security concerns are sensitive to flow of information in a program execution. The dataflow pointcut has been proposed by Masuhara and Kawauchi in order to easily implement s...
Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, ...
KI
2010
Springer
15 years 2 months ago
Soft Evidential Update via Markov Chain Monte Carlo Inference
The key task in probabilistic reasoning is to appropriately update one’s beliefs as one obtains new information in the form of evidence. In many application settings, however, th...
Dominik Jain, Michael Beetz
ADBIS
2006
Springer
118views Database» more  ADBIS 2006»
15 years 10 months ago
Computational Database Technology Applied to Option Pricing Via Finite Differences
Computational database technology spans the two research fields data-base technology and scientific computing. It involves development of database capabilities that support compu...
Jöns Åkerlund, Krister Åhlander, ...
CPHYSICS
2010
195views more  CPHYSICS 2010»
15 years 4 months ago
Fast spherical Bessel transform via fast Fourier transform and recurrence formula
We propose a new method for the numerical evaluation of the spherical Bessel transform. A formula is derived for the transform by using an integral representation of the spherical...
Masayuki Toyoda, Taisuke Ozaki