Sciweavers

18374 search results - page 3627 / 3675
» Applications for data hiding
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
13 years 7 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 7 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...
ENVSOFT
2007
108views more  ENVSOFT 2007»
13 years 7 months ago
Modeling biocomplexity - actors, landscapes and alternative futures
: Increasingly, models (and modelers) are being asked to address the interactions between human influences, ecological processes, and landscape dynamics that impact many diverse as...
John P. Bolte, David W. Hulse, Stanley V. Gregory,...
ENVSOFT
2007
127views more  ENVSOFT 2007»
13 years 7 months ago
River model calibration, from guidelines to operational support tools
Numerical modelling is now used routinely to make predictions about the behaviour of environmental systems. Model calibration remains a critical step in the modelling process and ...
Jean-Philippe Vidal, Sabine Moisan, Jean-Baptiste ...
EOR
2007
108views more  EOR 2007»
13 years 7 months ago
Probability density functions based weights for ordered weighted averaging (OWA) operators: An example of water quality indices
This paper explores the application of ordered weighted averaging (OWA) operators to develop water quality index, which incorporates an attitudinal dimension in the aggregation pr...
Rehan Sadiq, Solomon Tesfamariam
« Prev « First page 3627 / 3675 Last » Next »