Sciweavers

2421 search results - page 270 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
136
Voted
MP
2006
103views more  MP 2006»
15 years 4 months ago
Assessing solution quality in stochastic programs
Determining if a solution is optimal or near optimal is fundamental in optimization theory, algorithms, and computation. For instance, Karush-Kuhn-Tucker conditions provide necessa...
Güzin Bayraksan, David P. Morton
VR
2007
IEEE
115views Virtual Reality» more  VR 2007»
15 years 11 months ago
Effective Cooperative Haptic Interaction over the Internet
We present a system that enables, for the first time, effective transatlantic cooperative haptic manipulation of objects whose motion is computed using a physically-based model. ...
Mashhuda Glencross, Caroline Jay, Jeff Feasel, Luv...
MLDM
2007
Springer
15 years 11 months ago
Ensemble-based Feature Selection Criteria
Recursive Feature Elimination (RFE) combined with feature ranking is an effective technique for eliminating irrelevant features when the feature dimension is large, but it is diffi...
Terry Windeatt, Matthew Prior, Niv Effron, Nathan ...
164
Voted
BMCBI
2006
172views more  BMCBI 2006»
15 years 4 months ago
BioWarehouse: a bioinformatics database warehouse toolkit
Background: This article addresses the problem of interoperation of heterogeneous bioinformatics databases. Results: We introduce BioWarehouse, an open source toolkit for construc...
Thomas J. Lee, Yannick Pouliot, Valerie Wagner, Pr...
CSFW
2005
IEEE
15 years 10 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei