Sciweavers

4636 search results - page 731 / 928
» Modelling and Validation with VipTool
Sort
View
FUIN
2007
147views more  FUIN 2007»
13 years 9 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
PAMI
2008
157views more  PAMI 2008»
13 years 9 months ago
Subpixel Photometric Stereo
Conventional photometric stereo recovers one normal direction per pixel of the input image. This fundamentally limits the scale of recovered geometry to the resolution of the input...
Ping Tan, Stephen Lin, Long Quan
SIAMSC
2008
116views more  SIAMSC 2008»
13 years 9 months ago
A New Asymptotic Preserving Scheme Based on Micro-Macro Formulation for Linear Kinetic Equations in the Diffusion Limit
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Mohammed Lemou, Luc Mieussens
IJCIM
2007
122views more  IJCIM 2007»
13 years 9 months ago
Implementation approach of ERP with mass customization
: This paper analyzes the shortage of traditional ERP systems in the current dynamic and competitive enterprises environment. The new generation ERP system needs to be frequently c...
Y. Zhao, Y. S. Fan
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...