Sciweavers

366 search results - page 51 / 74
» Modeling Requirements for Value Configuration Design
Sort
View
CN
2008
127views more  CN 2008»
14 years 12 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
112
Voted
BMCBI
2010
135views more  BMCBI 2010»
14 years 12 months ago
Quadratic variance models for adaptively preprocessing SELDI-TOF mass spectrometry data
Background: Surface enhanced laser desorption/ionization time-of-flight mass spectrometry (SELDI) is a proteomics tool for biomarker discovery and other high throughput applicatio...
Vincent A. Emanuele II, Brian M. Gurbaxani
POPL
2012
ACM
13 years 7 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
EC
2010
157views ECommerce» more  EC 2010»
14 years 12 months ago
Memetic Algorithms for Continuous Optimisation Based on Local Search Chains
Memetic algorithms with continuous local search methods have arisen as effective tools to address the difficulty of obtaining reliable solutions of high precision for complex cont...
Daniel Molina, Manuel Lozano, Carlos García...
CORR
2010
Springer
219views Education» more  CORR 2010»
14 years 10 months ago
Cooperative Algorithms for MIMO Interference Channels
Interference alignment is a transmission technique for exploiting all available degrees of freedom in the symmetric frequency- or time-selective interference channel with an arbit...
Steven W. Peters, Robert W. Heath Jr.