Sciweavers

187 search results - page 23 / 38
» Combining simulation and formal methods for system-level per...
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
TMI
2010
175views more  TMI 2010»
13 years 2 months ago
Spatially Adaptive Mixture Modeling for Analysis of fMRI Time Series
Within-subject analysis in fMRI essentially addresses two problems, the detection of brain regions eliciting evoked activity and the estimation of the underlying dynamics. In [1, 2...
Thomas Vincent, Laurent Risser, Philippe Ciuciu
CSDA
2008
128views more  CSDA 2008»
13 years 7 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
BMCBI
2007
123views more  BMCBI 2007»
13 years 7 months ago
PedGenie: meta genetic association testing in mixed family and case-control designs
Background-: PedGenie software, introduced in 2006, includes genetic association testing of cases and controls that may be independent or related (nuclear families or extended ped...
Karen Curtin, Jathine Wong, Kristina Allen-Brady, ...
SIGIR
2011
ACM
12 years 10 months ago
The economics in interactive information retrieval
Searching is inherently an interactive process usually requiring numerous iterations of querying and assessing in order to find the desired amount of relevant information. Essent...
Leif Azzopardi