Sciweavers

1178 search results - page 109 / 236
» Modeling and analysis of content identification
Sort
View
SNPD
2008
13 years 10 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
APWEB
2006
Springer
14 years 28 days ago
Implementing Privacy Negotiations in E-Commerce
This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. We analyze how negotiation te...
Sören Preibusch
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 9 months ago
Robust Matrix Decomposition with Outliers
Suppose a given observation matrix can be decomposed as the sum of a low-rank matrix and a sparse matrix (outliers), and the goal is to recover these individual components from th...
Daniel Hsu, Sham M. Kakade, Tong Zhang
ENGL
2007
81views more  ENGL 2007»
13 years 9 months ago
Computational Comparisons of GPC and NGPC Schemes
—In this paper the GPC and NGPC model predictive control techniques are applied to a typical plant and compared in terms of computational efficiency. The system identification an...
D. N. Rao, M. R. K. Murthy, D. N. Harshal, S. R. M...
JCC
2002
88views more  JCC 2002»
13 years 8 months ago
Pattern recognition strategies for molecular surfaces. I. Pattern generation using fuzzy set theory
: A new method for the characterization of molecules based on the model approach of molecular surfaces is presented. We use the topographical properties of the surface as well as t...
Thomas E. Exner, Matthias Keil, Jürgen Brickm...