Sciweavers

575 search results - page 58 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 1 months ago
MOBICHARTS: A Notation to Specify Mobile Computing Applications
A standard notation, that unambiguously expresses different aspects of a system, is important to the process of software development. The expressiveness of a standard notation hel...
Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyam...
WWW
2011
ACM
13 years 2 months ago
Generalized fact-finding
Once information retrieval has located a document, and information extraction has provided its contents, how do we know whether we should actually believe it? Fact-finders are a ...
Jeff Pasternack, Dan Roth
IANDC
2006
97views more  IANDC 2006»
13 years 7 months ago
Pure bigraphs: Structure and dynamics
Abstract Bigraphs are graphs whose nodes may be nested, representing locality, independently of the edges connecting them. They may be equipped with reaction rules, forming a bigra...
Robin Milner
ARC
2009
Springer
188views Hardware» more  ARC 2009»
14 years 2 months ago
Word-Length Optimization and Error Analysis of a Multivariate Gaussian Random Number Generator
Abstract. Monte Carlo simulation is one of the most widely used techniques for computationally intensive simulations in mathematical analysis and modeling. A multivariate Gaussian ...
Chalermpol Saiprasert, Christos-Savvas Bouganis, G...
IPPS
1998
IEEE
13 years 11 months ago
Performance Range Comparison via Crossing Point Analysis
Parallel programming is elusive. The relative performance of di erent parallel implementations varies with machine architecture, system and problem size. How to compare di erent i...
Xian-He Sun