Sciweavers

580 search results - page 94 / 116
» Studying the History of Ideas Using Topic Models
Sort
View
105
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
14 years 11 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
FMOODS
2007
14 years 11 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
SODA
2008
ACM
97views Algorithms» more  SODA 2008»
14 years 11 months ago
Stochastic analyses for online combinatorial optimization problems
In this paper, we study online algorithms when the input is not chosen adversarially, but consists of draws from some given probability distribution. While this model has been stu...
Naveen Garg, Anupam Gupta, Stefano Leonardi, Piotr...
MMAS
2010
Springer
14 years 4 months ago
Filtering Random Layering Effects in Imaging
Objects that are buried deep in heterogeneous media produce faint echoes which are difficult to distinguish from the backscattered field. Sensor array imaging in such media cannot ...
Liliana Borcea, F. González del Cueto, Geor...
73
Voted
ICIAP
1999
ACM
15 years 1 months ago
Bayesian Graph Edit Distance
ÐThis paper describes a novel framework for comparing and matching corrupted relational graphs. The paper develops the idea of edit-distance originally introduced for graph-matchi...
Richard Myers, Richard C. Wilson, Edwin R. Hancock