Sciweavers

315 search results - page 27 / 63
» Claims Analysis
Sort
View
140
Voted
TIT
2008
72views more  TIT 2008»
15 years 3 months ago
On the Construction of (Explicit) Khodak's Code and Its Analysis
Variable-to-variable codes are very attractive yet not well understood data compression schemes. In 1972 Khodak claimed to provide upper and lower bounds for the achievable redund...
Yann Bugeaud, Michael Drmota, Wojciech Szpankowski
143
Voted
WPES
2003
ACM
15 years 9 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
136
Voted
CAD
2002
Springer
15 years 3 months ago
Integrated modeling, finite-element analysis, and engineering design for thin-shell structures using subdivision
Many engineering design applications require geometric modeling and mechanical simulation of thin flexible structures, such as those found in the automotive and aerospace industri...
Fehmi Cirak, Michael J. Scott, Erik K. Antonsson, ...
121
Voted
TSE
1998
83views more  TSE 1998»
15 years 3 months ago
Cost-Effective Analysis of In-Place Software Processes
—Process studies and improvement efforts typically call for new instrumentation on the process in order to collect the data they have deemed necessary. This can be intrusive and ...
Jonathan E. Cook, Lawrence G. Votta, Alexander L. ...
140
Voted
ICA
2010
Springer
15 years 2 months ago
Second Order Subspace Analysis and Simple Decompositions
Abstract. The recovery of the mixture of an N-dimensional signal generated by N independent processes is a well studied problem (see e.g. [1,10]) and robust algorithms that solve t...
Harold W. Gutch, Takanori Maehara, Fabian J. Theis