Sciweavers

772 search results - page 141 / 155
» Creating and analysing models in IBM Task Modeler
Sort
View
IJAR
2002
102views more  IJAR 2002»
13 years 8 months ago
Networks of probabilistic events in discrete time
The usual methods of applying Bayesian networks to the modeling of temporal processes, such as Dean and Kanazawa's dynamic Bayesian networks (DBNs), consist in discretizing t...
Severino F. Galán, Francisco Javier D&iacut...
ICSOC
2009
Springer
14 years 3 months ago
Engage: Engineering Service Modes with WS-Engineer and Dino
In this demonstration1 we present an approach to engineering service brokering requirements and capabilities using the concepts of Service Modes. The demonstration illustrates buil...
Howard Foster, Arun Mukhija, David S. Rosenblum, S...
MIR
2004
ACM
101views Multimedia» more  MIR 2004»
14 years 1 months ago
Leveraging face recognition technology to find and organize photos
With digital still cameras, users can easily collect thousands of photos. We have created a photo management application with the goal of making photo organization and browsing si...
Andreas Girgensohn, John Adcock, Lynn Wilcox
BMCBI
2008
158views more  BMCBI 2008»
13 years 8 months ago
LC-MSsim - a simulation software for liquid chromatography mass spectrometry data
Background: Mass Spectrometry coupled to Liquid Chromatography (LC-MS) is commonly used to analyze the protein content of biological samples in large scale studies. The data resul...
Ole Schulz-Trieglaff, Nico Pfeifer, Clemens Gr&oum...
ECOOP
2005
Springer
14 years 2 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...