Sciweavers

4167 search results - page 717 / 834
» Regression model checking
Sort
View
GMP
2010
IEEE
175views Solid Modeling» more  GMP 2010»
15 years 2 months ago
Optimal Analysis-Aware Parameterization of Computational Domain in Isogeometric Analysis
Abstract. In isogeometric analysis (IGA for short) framework, computational domain is exactly described using the same representation as that employed in the CAD process. For a CAD...
Gang Xu, Bernard Mourrain, Régis Duvigneau,...
POPL
1999
ACM
15 years 2 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
LICS
1999
IEEE
15 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
15 years 2 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
KBSE
1998
IEEE
15 years 2 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green