Sciweavers

2938 search results - page 564 / 588
» On obfuscating point functions
Sort
View
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 9 months ago
Temporal Support of Regular Expressions in Sequential Pattern Mining
Classic algorithms for sequential pattern discovery, return all frequent sequences present in a database. Since, in general, only a few ones are interesting from a user's poin...
Leticia I. Gómez, Bart Kuijpers, Alejandro ...
CSCW
2008
ACM
13 years 9 months ago
Physical and Digital Artifact-Mediated Coordination in Building Design
We conducted an ethnographic field study examining how a building design team used representational artifacts to coordinate the design of building systems, structure, and architect...
Melanie Tory, Sheryl Staub-French, Barry A. Po, Fu...
EOR
2010
110views more  EOR 2010»
13 years 9 months ago
Pricing surplus server capacity for mean waiting time sensitive customers
Resources including various assets of supply chains, face random demand over time and can be shared by others. We consider an operational setting where a resource is shared by two...
Sudhir K. Sinha, N. Rangaraj, N. Hemachandra
ENTCS
2008
146views more  ENTCS 2008»
13 years 9 months ago
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions
istic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions Michael J. A. Smith1 ,2 Laboratory for Foundations of Computer Science University of Edinb...
Michael J. A. Smith
BMCBI
2006
127views more  BMCBI 2006»
13 years 9 months ago
On the attenuation and amplification of molecular noise in genetic regulatory networks
Background: Noise has many important roles in cellular genetic regulatory functions at the nanomolar scale. At present, no good theory exists for identifying all possible mechanis...
Bor-Sen Chen, Yu-Chao Wang