Sciweavers

2421 search results - page 378 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CAV
2006
Springer
116views Hardware» more  CAV 2006»
15 years 8 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
IEEEVAST
2010
14 years 11 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
BMCBI
2006
87views more  BMCBI 2006»
15 years 4 months ago
Prediction of indirect interactions in proteins
Background: Both direct and indirect interactions determine molecular recognition of ligands by proteins. Indirect interactions can be defined as effects on recognition controlled...
Peteris Prusis, Staffan Uhlén, Ramona Petro...
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 4 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
16 years 1 months ago
Performance-oriented statistical parameter reduction of parameterized systems via reduced rank regression
Process variations in modern VLSI technologies are growing in both magnitude and dimensionality. To assess performance variability, complex simulation and performance models param...
Zhuo Feng, Peng Li