Sciweavers

43264 search results - page 8272 / 8653
» Comparing models of computation
Sort
View
CIMAGING
2009
145views Hardware» more  CIMAGING 2009»
15 years 4 months ago
Wavelet-based Poisson rate estimation using the Skellam distribution
Owing to the stochastic nature of discrete processes such as photon counts in imaging, real-world data measurements often exhibit heteroscedastic behavior. In particular, time ser...
Keigo Hirakawa, Farhan A. Baqai, Patrick J. Wolfe
ECAI
2010
Springer
15 years 4 months ago
Learning Aggregation Functions for Expert Search
Abstract. Machine learning techniques are increasingly being applied to problems in the domain of information retrieval and text mining. In this paper we present an application of ...
Ronan Cummins, Mounia Lalmas, Colm O'Riordan
112
Voted
ECSA
2010
Springer
15 years 4 months ago
Model-based enhancement of software performance for precision critical systems
Architectural level analysis of a software system for its quality attributes is a proven cost-effective approach. This is particularly significant for performance, which defines m...
Naeem Muhammad, Nelis Boucké, Yolande Berbe...
135
Voted
DAIS
2008
15 years 4 months ago
Using Object Replication for Building a Dependable Version Control System
Object-oriented technologies are frequently used to design and implement distributed applications. Object replication is a well-established approach to increase the dependability f...
Rüdiger Kapitza, Peter Baumann, Hans P. Reise...
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 4 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
« Prev « First page 8272 / 8653 Last » Next »