Sciweavers

1748 search results - page 239 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
JOT
2002
105views more  JOT 2002»
15 years 2 months ago
Java Distributed Separate Objects
Java supports distributed programming using threads and Remote Method Invocation (JRMI). However, a Java thread does not match well with the object concept, and JRMI cannot easily...
Miguel Katrib, Iskander Sierra, Mario del Valle, T...
ICSE
2004
IEEE-ACM
16 years 3 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
HPDC
2008
IEEE
15 years 3 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
MICCAI
2007
Springer
16 years 4 months ago
Characterizing Task-Related Temporal Dynamics of Spatial Activation Distributions in fMRI BOLD Signals
We present a new functional magnetic resonance imaging (fMRI) analysis method that incorporates both spatial and temporal dynamics of bloodoxygen-level dependent (BOLD) signals wit...
Bernard Ng, Rafeef Abugharbieh, Samantha J. Palmer...
ICDM
2008
IEEE
115views Data Mining» more  ICDM 2008»
15 years 9 months ago
Toward Faster Nonnegative Matrix Factorization: A New Algorithm and Comparisons
Nonnegative Matrix Factorization (NMF) is a dimension reduction method that has been widely used for various tasks including text mining, pattern analysis, clustering, and cancer ...
Jingu Kim, Haesun Park