Sciweavers

7296 search results - page 1452 / 1460
» informs 2010
Sort
View
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 4 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
ECEASST
2010
14 years 4 months ago
Verified Visualisation of Textual Modelling Languages
Abstract. Many modelling languages have both a textual and a graphical form. The relationship between these two forms ought to be clear and concrete, but is instead commonly unders...
Fintan Fairmichael, Joseph Kiniry
RE
2010
Springer
14 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
14 years 4 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
SIGMOD
2010
ACM
132views Database» more  SIGMOD 2010»
14 years 4 months ago
Durable top-k search in document archives
We propose and study a new ranking problem in versioned databases. Consider a database of versioned objects which have different valid instances along a history (e.g., documents i...
Leong Hou U, Nikos Mamoulis, Klaus Berberich, Srik...
« Prev « First page 1452 / 1460 Last » Next »