Sciweavers

886 search results - page 151 / 178
» Experiences Using Lightweight Formal Methods for Requirement...
Sort
View
IFM
2007
Springer
129views Formal Methods» more  IFM 2007»
15 years 4 months ago
Slotted-Circus
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Andrew Butterfield, Adnan Sherif, Jim Woodcock
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
15 years 10 months ago
Mining optimal decision trees from itemset lattices
We present DL8, an exact algorithm for finding a decision tree that optimizes a ranking function under size, depth, accuracy and leaf constraints. Because the discovery of optimal...
Élisa Fromont, Siegfried Nijssen
CPHYSICS
2010
88views more  CPHYSICS 2010»
14 years 10 months ago
Distributed computing as a virtual supercomputer: Tools to run and manage large-scale BOINC simulations
Distributed computing (DC) projects tackle large computational problems by exploiting the donated processing power of thousands of volunteered computers, connected through the Int...
Toni Giorgino, Matt J. Harvey, Gianni De Fabritiis
ICIP
2002
IEEE
15 years 11 months ago
No-reference perceptual quality assessment of JPEG compressed images
Human observers can easily assess the quality of a distorted image without examining the original image as a reference. By contrast, designing objective No-Reference (NR) quality ...
Hamid R. Sheikh, Zhou Wang, Alan C. Bovik
SAC
2010
ACM
15 years 3 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper