Sciweavers

3639 search results - page 83 / 728
» Provenance as Dependency Analysis
Sort
View
VISUALIZATION
1995
IEEE
15 years 1 months ago
Qualitative Analysis of Invariant Tori in a Dynamical System
Invariant tori are examples of invariant manifolds in dynamical systems. Usual tools in dynamical systems such as analysis and numerical simulations alone are often not sufficient...
Daryl H. Hepting, Gianne Derks, Kossi D. Edoh, Rob...
ICASSP
2011
IEEE
14 years 1 months ago
Discriminatively trained Probabilistic Linear Discriminant Analysis for speaker verification
Recently, i-vector extraction and Probabilistic Linear Discriminant Analysis (PLDA) have proven to provide state-of-the-art speaker verification performance. In this paper, the s...
Lukas Burget, Oldrich Plchot, Sandro Cumani, Ondre...
CORR
2010
Springer
127views Education» more  CORR 2010»
14 years 4 months ago
Complexity of Data Dependence problems for Program Schemas with Concurrency
am analysis and has been widely studied. In this paper we consider this problem at the abstraction level of program schemas in which computations occur in the Herbrand domain of te...
Sebastian Danicic, Robert M. Hierons, Michael R. L...
INFOCOM
2007
IEEE
15 years 4 months ago
On Optimal Physical Carrier Sensing: Theoretical Analysis and Protocol Design
— Traditional Physical Carrier Sensing (PCS), which aims at eliminating hidden terminals in wireless networks, causes too many exposed terminals and deteriorates the throughput p...
Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu
ACSAC
1999
IEEE
15 years 2 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox