Sciweavers

335 search results - page 31 / 67
» Analysis of application performance and its change via repre...
Sort
View
CDC
2010
IEEE
172views Control Systems» more  CDC 2010»
12 years 11 months ago
Electrical centrality measures for electric power grid vulnerability analysis
— This paper investigates measures of centrality that are applicable to power grids. Centrality measures are used in network science to rank the relative importance of nodes and ...
Zhifang Wang, Anna Scaglione, Robert J. Thomas
ICCV
2003
IEEE
14 years 9 months ago
Epitomic analysis of appearance and shape
See www.research.microsoft.com/jojic/epitome.htm for videos, comparisons and applications. We present novel simple appearance and shape models that we call epitomes. The epitome o...
Nebojsa Jojic, Brendan J. Frey, Anitha Kannan
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
14 years 9 months ago
How to Determine a Good Multi-Programming Level for External Scheduling
Scheduling/prioritization of DBMS transactions is important for many applications that rely on database backends. A convenient way to achieve scheduling is to limit the number of ...
Bianca Schroeder, Mor Harchol-Balter, Arun Iyengar...
TIP
2008
153views more  TIP 2008»
13 years 7 months ago
Generalized Flooding and Multicue PDE-Based Image Segmentation
Image segmentation remains an important, but hard-to-solve, problem since it appears to be application dependent with usually no a priori information available regarding the image ...
Anastasia Sofou, Petros Maragos