Sciweavers

79 search results - page 12 / 16
» Data envelopment analysis with imprecise data
Sort
View
POPL
2009
ACM
14 years 8 months ago
Compositional shape analysis by means of bi-abduction
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. The analysis uses an abstract domain based on a restricted frag...
Cristiano Calcagno, Dino Distefano, Peter W. O'Hea...
ISIPTA
2005
IEEE
155views Mathematics» more  ISIPTA 2005»
14 years 1 months ago
Estimation of Chaotic Probabilities
A Chaotic Probability model is a usual set of probability measures, M, the totality of which is endowed with an objective, frequentist interpretation as opposed to being viewed as...
Leandro Chaves Rêgo, Terrence L. Fine
BMCBI
2008
147views more  BMCBI 2008»
13 years 7 months ago
Transmembrane helix prediction using amino acid property features and latent semantic analysis
Background: Prediction of transmembrane (TM) helices by statistical methods suffers from lack of sufficient training data. Current best methods use hundreds or even thousands of f...
Madhavi Ganapathiraju, Narayanas Balakrishnan, Raj...
BMCBI
2008
89views more  BMCBI 2008»
13 years 7 months ago
R/parallel - speeding up bioinformatics analysis with R
Background: R is the preferred tool for statistical analysis of many bioinformaticians due in part to the increasing number of freely available analytical methods. Such methods ca...
Gonzalo Vera, Ritsert C. Jansen, Remo Suppi
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 7 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...