Sciweavers

3220 search results - page 612 / 644
» Constrained Graph Processes
Sort
View
IJFCS
2006
110views more  IJFCS 2006»
14 years 9 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
JCP
2008
116views more  JCP 2008»
14 years 9 months ago
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications
Fault detection in large-scale systems is conducted by the use of sensors, thus the sensor location influences the performances of fault detection directly. As the scale of systems...
Fan Yang, Deyun Xiao
DKE
2007
130views more  DKE 2007»
14 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
FGCS
2007
160views more  FGCS 2007»
14 years 9 months ago
Distributed data mining in grid computing environments
The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with an e...
Ping Luo, Kevin Lü, Zhongzhi Shi, Qing He
81
Voted
IJCINI
2007
125views more  IJCINI 2007»
14 years 9 months ago
A Unified Approach To Fractal Dimensions
The Cognitive Processes of Abstraction and Formal Inferences J. A. Anderson: A Brain-Like Computer for Cognitive Software Applications: the Resatz Brain Project L. Flax: Cognitive ...
Witold Kinsner