Sciweavers

27692 search results - page 273 / 5539
» Where is ...
Sort
View
102
Voted
MOC
1998
109views more  MOC 1998»
15 years 12 days ago
A comparison of regularizations for an ill-posed problem
Abstract. We consider numerical methods for a “quasi-boundary value” regularization of the backward parabolic problem given by ut + Au = 0 , 0 < t < T u(T ) = f, where A ...
Karen A. Ames, Gordon W. Clark, James F. Epperson,...
82
Voted
PR
2002
85views more  PR 2002»
15 years 12 days ago
An incremental prototype set building technique
This paper deals with the task of "nding a set of prototypes from the training set. A reduced set is obtained which is used instead of the training set when nearest neighbour...
V. Susheela Devi, M. Narasimha Murty
SIAMCOMP
1998
168views more  SIAMCOMP 1998»
15 years 12 days ago
Efficient Algorithms for the Domination Problems on Interval and Circular-Arc Graphs
This paper first presents a unified approach to design efficient algorithms for the weighted domination problem and its three variants, i.e., the weighted independent, connected,...
Maw-Shang Chang
SAC
2002
ACM
15 years 12 days ago
Contradictions and critical issues during system evolution
In this paper the issue of system evolution is addressed. Activity Theory and the concept of exapansive cycles are reviewed as theories to explain systemic evolution. Contradictio...
Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasqu...
SAJ
2002
97views more  SAJ 2002»
15 years 12 days ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier