Sciweavers

4511 search results - page 745 / 903
» Observation Based System Security
Sort
View
ACL
1993
14 years 11 months ago
Identifying Relevant Prior Explanations
When human tutors engage in dialogue, they freely exploit allaspects of the mutually known context, including the previous discourse. Utterances that do not draw on previous disco...
James A. Rosenblum
CONEXT
2009
ACM
14 years 11 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
CORR
2010
Springer
96views Education» more  CORR 2010»
14 years 10 months ago
LSMR: An iterative algorithm for sparse least-squares problems
Abstract. An iterative method LSMR is presented for solving linear systems Ax = b and leastsquares problem min Ax - b 2, with A being sparse or a fast linear operator. LSMR is base...
David Fong, Michael Saunders
FIRSTMONDAY
2008
121views more  FIRSTMONDAY 2008»
14 years 10 months ago
Free and Open Source Licenses in Community Life: Two Empirical Cases
How do licenses participate in Free and Open Source Software (FLOSS) community life? This paper aims at answering this question. Despite the dynamic character of FLOSS development...
Stefano De Paoli, Maurizio Teli, Vincenzo D'Andrea
DSP
2006
14 years 10 months ago
Blind image deconvolution via dispersion minimization
In linear image restoration, the point spread function of the degrading system is assumed known even though this information is usually not available in real applications. As a re...
C. Vural, William A. Sethares