Sciweavers

1575 search results - page 163 / 315
» The provenance of electronic data
Sort
View
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 28 days ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
TCBB
2008
122views more  TCBB 2008»
14 years 11 months ago
Mixed Integer Linear Programming for Maximum-Parsimony Phylogeny Inference
Reconstruction of phylogenetic trees is a fundamental problem in computational biology. While excellent heuristic methods are available for many variants of this problem, new adva...
Srinath Sridhar, Fumei Lam, Guy E. Blelloch, R. Ra...
KBS
2007
100views more  KBS 2007»
14 years 11 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
TMI
1998
175views more  TMI 1998»
14 years 11 months ago
A Harmonic Decomposition Reconstruction Algorithm for Spatially-Varying Focal Length Collimators
—Spatially varying focal length fan-beam collimators can be used in single photon emission computed tomography to improve detection efficiency and to reduce reconstruction artif...
Jiangsheng You, Zhengrong Liang, Shanglian Bao
PVLDB
2008
111views more  PVLDB 2008»
14 years 11 months ago
Approximate lineage for probabilistic databases
In probabilistic databases, lineage is fundamental to both query processing and understanding the data. Current systems s.a. Trio or Mystiq use a complete approach in which the li...
Christopher Ré, Dan Suciu