Sciweavers

2006 search results - page 166 / 402
» Heuristic Security-Testing Methods
Sort
View
167
Voted
ICSR
2011
Springer
14 years 4 months ago
Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling
Product Line Architecture (PLA) plays a central role in software product line development. In order to support architecture-level variability modeling, most architecture descriptio...
Jiayi Zhu, Xin Peng, Stan Jarzabek, Zhenchang Xing...
150
Voted
SIGMOD
2011
ACM
269views Database» more  SIGMOD 2011»
14 years 3 months ago
Advancing data clustering via projective clustering ensembles
Projective Clustering Ensembles (PCE) are a very recent advance in data clustering research which combines the two powerful tools of clustering ensembles and projective clustering...
Francesco Gullo, Carlotta Domeniconi, Andrea Tagar...
133
Voted
DAGSTUHL
2011
14 years 27 days ago
Interactive Isocontouring of High-Order Surfaces
Scientists and engineers are making increasingly use of hp-adaptive discretization methods to compute simulations. While techniques for isocontouring the high-order data generated...
Christian Azambuja Pagot, Joachim E. Vollrath, Fil...
ATAL
2007
Springer
15 years 7 months ago
On opportunistic techniques for solving decentralized Markov decision processes with temporal constraints
Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve...
Janusz Marecki, Milind Tambe
147
Voted
BMCBI
2005
113views more  BMCBI 2005»
15 years 1 months ago
Systematic survey reveals general applicability of "guilt-by-association" within gene coexpression networks
Background: Biological processes are carried out by coordinated modules of interacting molecules. As clustering methods demonstrate that genes with similar expression display incr...
Cecily J. Wolfe, Isaac S. Kohane, Atul J. Butte