Sciweavers

12950 search results - page 2342 / 2590
» On Optimal Timed Strategies
Sort
View
EMS
2008
IEEE
13 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
DATESO
2007
157views Database» more  DATESO 2007»
13 years 11 months ago
Index-Based Approach to Similarity Search in Protein and Nucleotide Databases
When searching databases of nucleotide or protein sequences, finding a local alignment of two sequences is one of the main tasks. Since the sizes of available databases grow const...
David Hoksza, Tomás Skopal
EMNLP
2007
13 years 11 months ago
Scalable Term Selection for Text Categorization
In text categorization, term selection is an important step for the sake of both categorization accuracy and computational efficiency. Different dimensionalities are expected und...
Jingyang Li, Maosong Sun
MASCOTS
2010
13 years 11 months ago
Efficient Discovery of Loop Nests in Execution Traces
Execution and communication traces are central to performance modeling and analysis. Since the traces can be very long, meaningful compression and extraction of representative beha...
Qiang Xu, Jaspal Subhlok, Nathaniel Hammen
GRAPHICSINTERFACE
2007
13 years 11 months ago
Adapting wavelet compression to human motion capture clips
Motion capture data is an effective way of synthesizing human motion for many interactive applications, including games and simulations. A compact, easy-to-decode representation i...
Philippe Beaudoin, Pierre Poulin, Michiel van de P...
« Prev « First page 2342 / 2590 Last » Next »