Sciweavers

1441 search results - page 241 / 289
» Multiple instance ranking
Sort
View
ENTCS
2006
174views more  ENTCS 2006»
13 years 9 months ago
Symbolic Reasoning with Weighted and Normalized Decision Diagrams
Several variants of Bryant's ordered binary decision diagrams have been suggested in the literature to reason about discrete functions. In this paper, we introduce a generic ...
Jörn Ossowski, Christel Baier
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JCNS
2006
59views more  JCNS 2006»
13 years 9 months ago
Spatio-temporal filtering properties of a dendritic cable with active spines: A modeling study in the spike-diffuse-spike framew
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modeled with a simple integrate-and-fire process, whils...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
EOR
2007
90views more  EOR 2007»
13 years 9 months ago
Accelerating column generation for variable sized bin-packing problems
In this paper, we study different strategies to stabilize and accelerate the column generation method, when it is applied specifically to the variable sized bin-packing problem,...
Cláudio Alves, José M. Valéri...
IJWET
2007
99views more  IJWET 2007»
13 years 9 months ago
An empirical approach to evaluating web application compliance across diverse client platform configurations
: Web applications are the most widely used class of software today. Increased diversity of web-client platform configurations causes execution of web applications to vary unpredic...
Cyntrica Eaton, Atif M. Memon