Sciweavers

40212 search results - page 7837 / 8043
» More
Sort
View
SIAMJO
2010
121views more  SIAMJO 2010»
15 years 2 months ago
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerabilit...
Ali Pinar, Juan Meza, Vaibhav Donde, Bernard C. Le...
SIAMSC
2010
141views more  SIAMSC 2010»
15 years 2 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
SIGIR
2010
ACM
15 years 2 months ago
EUSUM: extracting easy-to-understand english summaries for non-native readers
In this paper we investigate a novel and important problem in multi-document summarization, i.e., how to extract an easy-tounderstand English summary for non-native readers. Exist...
Xiaojun Wan, Huiying Li, Jianguo Xiao
SIGOPS
2010
130views more  SIGOPS 2010»
15 years 2 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
SIGSOFT
2010
ACM
15 years 2 months ago
SCORE: the first student contest on software engineering
The Student Contest on Software Engineering (SCORE), organized for the first time in conjunction with the International Conference on Software Engineering (ICSE) 2009, attracted 5...
Dino Mandrioli, Stephen Fickas, Carlo A. Furia, Me...
« Prev « First page 7837 / 8043 Last » Next »