Sciweavers

SIAMREV
2010
132views more  SIAMREV 2010»
13 years 6 months ago
A Stochastic Collocation Method for Elliptic Partial Differential Equations with Random Input Data
In this paper we propose and analyze a Stochastic-Collocation method to solve elliptic Partial Differential Equations with random coefficients and forcing terms (input data of the...
Ivo Babuska, Fabio Nobile, Raúl Tempone
ADCM
2011
13 years 7 months ago
Convergence and smoothness analysis of subdivision rules in Riemannian and symmetric spaces
After a discussion on definability of invariant subdivision rules we discuss rules for sequential data living in Riemannian manifolds and in symmetric spaces, having in mind the s...
Johannes Wallner, Esfandiar Nava Yazdani, Andreas ...
IPPS
2010
IEEE
13 years 9 months ago
Reconciling scratch space consumption, exposure, and volatility to achieve timely staging of job input data
Innovative scientific applications and emerging dense data sources are creating a data deluge for highend computing systems. Processing such large input data typically involves cop...
Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhk...
ICLP
2010
Springer
13 years 9 months ago
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
We present a framework for (static) verification of general resource usage program properties. The framework extends the criteria of correctness as the conformance of a program to ...
Pedro López-García, Luthfi Darmawan,...
MVA
2010
130views Computer Vision» more  MVA 2010»
13 years 10 months ago
Neighborhood linear embedding for intrinsic structure discovery
In this paper, an unsupervised learning algorithm, neighborhood linear embedding (NLE), is proposed to discover the intrinsic structures such as neighborhood relationships, global ...
Shuzhi Sam Ge, Feng Guan, Yaozhang Pan, Ai Poh Loh
INFOCOM
2010
IEEE
13 years 10 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
SAC
2008
ACM
13 years 11 months ago
Adding background knowledge to formal concept analysis via attribute dependency formulas
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Radim Belohlávek, Vilém Vychodil
NJC
2006
102views more  NJC 2006»
13 years 11 months ago
Online Evaluation of Regular Tree Queries
Regular tree queries (RTQs) are a class of queries considered especially relevant for the expressiveness and evaluation of XML query languages. The algorithms proposed so far for ...
Alexandru Berlea
IJCV
2006
79views more  IJCV 2006»
13 years 12 months ago
Splines in Higher Order TV Regularization
Splines play an important role as solutions of various interpolation and approximation problems that minimize special functionals in some smoothness spaces. In this paper, we show ...
Gabriele Steidl, Stephan Didas, Julia Neumann
BMCBI
2010
109views more  BMCBI 2010»
13 years 12 months ago
ParallABEL: an R library for generalized parallelization of genome-wide association studies
Background: Genome-Wide Association (GWA) analysis is a powerful method for identifying loci associated with complex traits and drug response. Parts of GWA analyses, especially th...
Unitsa Sangket, Surakameth Mahasirimongkol, Wasun ...