Sciweavers

14347 search results - page 2457 / 2870
» Interactive Granular Computing
Sort
View
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
CORR
2007
Springer
99views Education» more  CORR 2007»
15 years 4 months ago
Evolutionary Mesh Numbering: Preliminary Results
Abstract. Mesh numbering is a critical issue in Finite Element Methods, as the computational cost of one analysis is highly dependent on the order of the nodes of the mesh. This pa...
Francis Sourd, Marc Schoenauer
JMLR
2006
80views more  JMLR 2006»
15 years 4 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
ENTCS
2007
118views more  ENTCS 2007»
15 years 4 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...
JUCS
2006
128views more  JUCS 2006»
15 years 4 months ago
A Web-Based Decision Support System for Chronic Diseases
: Individuals vary in survival chances due to differences in genetics, environmental exposures, and gene-environment interactions. These chances, as well as the contribution of eac...
Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huan...
« Prev « First page 2457 / 2870 Last » Next »