Sciweavers

5544 search results - page 940 / 1109
» Three Inadequate Models
Sort
View
JUCS
2010
108views more  JUCS 2010»
14 years 10 months ago
Extending the Methods for Computing the Importance of Entity Types in Large Conceptual Schemas
: Visualizing and understanding large conceptual schemas requires the use of specific methods. These methods generate clustered, summarized, or focused schemas that are easier to v...
Antonio Villegas, Antoni Olivé
136
Voted
MIA
2010
95views more  MIA 2010»
14 years 10 months ago
Evaluation of brain atrophy estimation algorithms using simulated ground-truth data
A number of analysis tools have been developed for the estimation of brain atrophy using MRI. Since brain atrophy is being increasingly used as a marker of disease progression in ...
Swati Sharma, Vincent Noblet, François Rous...
MLDM
2010
Springer
14 years 10 months ago
The Impact of Experimental Setup in Prepaid Churn Prediction for Mobile Telecommunications: What to Predict, for Whom and Does t
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (`churn') at their convenience and without notification. This mak...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
104
Voted
SIAMMA
2010
97views more  SIAMMA 2010»
14 years 10 months ago
Small Volume Fraction Limit of the Diblock Copolymer Problem: I. Sharp-Interface Functional
We present the first of two articles on the small volume fraction limit of a nonlocal Cahn-Hilliard functional introduced to model microphase separation of diblock copolymers. Her...
Rustum Choksi, Mark A. Peletier
137
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...