Sciweavers

1036 search results - page 67 / 208
» Utilizing Validation Experience for System Validation
Sort
View
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
15 years 1 months ago
Quadratic Programming based data assimilation with passive drifting sensors for shallow water flows
We present a method for assimilating Lagrangian sensor measurement data into a Shallow Water Equation model. Using our method, the variational data assimilation problem is formulat...
Andrew Tinka, Issam S. Strub, Qingfang Wu, Alexand...
JSAC
2007
155views more  JSAC 2007»
14 years 11 months ago
Semantic social overlay networks
— Peer selection for query routing is a core task in peer-to-peer networks. Unstructured peer-to-peer systems (like Gnutella) ignore this problem, leading to an abundance of netw...
Alexander Löser, Steffen Staab, Christoph Tem...
BMCBI
2008
166views more  BMCBI 2008»
14 years 12 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
OSDI
1996
ACM
15 years 1 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
DSN
2008
IEEE
15 years 1 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie