Sciweavers

444 search results - page 57 / 89
» Sensitive state-space exploration
Sort
View
IPPS
2006
IEEE
15 years 5 months ago
Performance analysis of parallel programs via message-passing graph traversal
The ability to understand the factors contributing to parallel program performance are vital for understanding the impact of machine parameters on the performance of specific app...
Matthew J. Sottile, Vaddadi P. Chandu, David A. Ba...
CSFW
2005
IEEE
15 years 5 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
KES
2004
Springer
15 years 5 months ago
A Comparison of Two Approaches to Data Mining from Imbalanced Data
Our objective is a comparison of two data mining approaches to dealing with imbalanced data sets. The first approach is based on saving the original rule set, induced by the LEM2 ...
Jerzy W. Grzymala-Busse, Jerzy Stefanowski, Szymon...
ISIPTA
2003
IEEE
127views Mathematics» more  ISIPTA 2003»
15 years 5 months ago
Climate Projections for the 21st Century Using Random Sets
We apply random set theory to an analysis of future climate change. Bounds on cumulative probability are used to quantify uncertainties in natural and socio-economic factors that ...
Elmar Kriegler, Hermann Held
ICPR
2000
IEEE
15 years 4 months ago
Color Appearance and the Digital Imaging Pipeline
An effective image reproduction pipeline, spanning image capture, processing and display, must be designed to account for the properties of the human observer. In designing an ima...
Brian A. Wandell