Sciweavers

16513 search results - page 2939 / 3303
» Numerical Analysis Methods
Sort
View
143
Voted
INFOVIS
1999
IEEE
15 years 9 months ago
Navigating Hierarchies with Structure-Based Brushes
Interactive selection is a critical component in exploratory visualization, allowing users to isolate subsets of the displayed information for highlighting, deleting, analysis, or...
Ying-Huey Fua, Matthew O. Ward, Elke A. Rundenstei...
CAV
1999
Springer
125views Hardware» more  CAV 1999»
15 years 9 months ago
Model Checking of Safety Properties
Of special interest in formal verification are safety properties, which assert that the system always stays within some allowed region. A computation that violates a general linea...
Orna Kupferman, Moshe Y. Vardi
ISCAS
1999
IEEE
121views Hardware» more  ISCAS 1999»
15 years 9 months ago
The linear time-varying approach applied to a first-order dynamic translinear filter
Dynamic translinear (DTL) circuits use the exponential inputoutput relation of the transistor as a primitive for the synthesis of electronic circuits. As a consequence the analysi...
F. C. M. Kuijstermans, F. M. Diepstraten, Wouter A...
DAWAK
1999
Springer
15 years 9 months ago
Mining Interval Time Series
Data mining can be used to extensively automate the data analysis process. Techniques for mining interval time series, however, have not been considered. Such time series are commo...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
LICS
1999
IEEE
15 years 9 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
« Prev « First page 2939 / 3303 Last » Next »