Sciweavers

77016 search results - page 340 / 15404
» Modeling
Sort
View
134
Voted
AAAI
1992
15 years 6 months ago
Causal Approximations
models require the identi cation of abstractions and approximations that are well suited to the task at hand. In this paper we analyze the problem of automatically selecting adequ...
P. Pandurang Nayak
AAAI
1990
15 years 6 months ago
Approximation Reformulations
Although computers are widely used to simulate complex physical systems, crafting the underlying models that enable computer analysis remains difficult. When a model is created fo...
Daniel S. Weld
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 4 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
CLEIEJ
2007
203views more  CLEIEJ 2007»
15 years 4 months ago
Optimization Criteria for Effort Estimation using Fuzzy Technique
Effective cost estimation is the most challenging activity in software development. Software cost estimation is not an exact science. Cost estimation process involves a series of ...
Harish Mittal, Pradeep Bhatia
CVIU
2007
113views more  CVIU 2007»
15 years 4 months ago
Primal sketch: Integrating structure and texture
This article proposes a generative image model, which is called ‘‘primal sketch,’’ following Marr’s insight and terminology. This model combines two prominent classes of...
Cheng-en Guo, Song Chun Zhu, Ying Nian Wu
« Prev « First page 340 / 15404 Last » Next »