Sciweavers

536 search results - page 68 / 108
» Reusing Models of Different Abstraction Levels
Sort
View
IJHPCA
2007
114views more  IJHPCA 2007»
14 years 10 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
TASLP
2010
109views more  TASLP 2010»
14 years 8 months ago
Model-Based Expectation-Maximization Source Separation and Localization
Abstract—This paper describes a system, referred to as modelbased expectation-maximization source separation and localization (MESSL), for separating and localizing multiple soun...
Michael I. Mandel, Ron J. Weiss, Daniel P. W. Elli...
AMT
2006
Springer
91views Multimedia» more  AMT 2006»
15 years 1 months ago
Rough Set Model for Constraint-based Multi-dimensional Association Rule Mining
Abstract. This paper presents a rough set model for constraint-based multidimensional association rule mining. It first overviews the progress in constraintbased multi-dimensional ...
Wanzhong Yang, Yuefeng Li, Yue Xu, Hang Liu
ISW
2005
Springer
15 years 3 months ago
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
Zhenghong Wang, Ruby B. Lee
EDOC
2002
IEEE
15 years 3 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...