Sciweavers

1123 search results - page 209 / 225
» On Event Based State Estimation
Sort
View
PSD
2004
Springer
108views Database» more  PSD 2004»
14 years 22 days ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia
SAB
2004
Springer
159views Optimization» more  SAB 2004»
14 years 22 days ago
Swarming Behavior Using Probabilistic Roadmap Techniques
While techniques exist for simulating swarming behaviors, these methods usually provide only simplistic navigation and planning capabilities. In this review, we explore the benefi...
O. Burçhan Bayazit, Jyh-Ming Lien, Nancy M....
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ECOOPW
1998
Springer
13 years 11 months ago
Mapping Business Processes to Software Design Artifacts
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
Pavel Hruby
BMCBI
2010
151views more  BMCBI 2010»
13 years 7 months ago
Data reduction for spectral clustering to analyze high throughput flow cytometry data
Background: Recent biological discoveries have shown that clustering large datasets is essential for better understanding biology in many areas. Spectral clustering in particular ...
Habil Zare, Parisa Shooshtari, Arvind Gupta, Ryan ...