Sciweavers

388 search results - page 77 / 78
» Quantifying Similarities Between Timed Systems
Sort
View
DELOS
2000
13 years 10 months ago
Using the Wavelet Transform to Learn from User Feedback
User feedback has proven very successful to query large multimedia databases. Due to the nature of the data representation and the mismatch between mathematical models and human p...
Ilaria Bartolini, Paolo Ciaccia, Florian Waas
CONEXT
2009
ACM
13 years 9 months ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 6 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
JCC
2011
133views more  JCC 2011»
13 years 3 months ago
MIBPB: A software package for electrostatic analysis
: The Poisson–Boltzmann equation (PBE) is an established model for the electrostatic analysis of biomolecules. The development of advanced computational techniques for the soluti...
Duan Chen, Zhan Chen, Changjun Chen, Weihua Geng, ...
SIAMIS
2011
13 years 3 months ago
Large Scale Bayesian Inference and Experimental Design for Sparse Linear Models
Abstract. Many problems of low-level computer vision and image processing, such as denoising, deconvolution, tomographic reconstruction or superresolution, can be addressed by maxi...
Matthias W. Seeger, Hannes Nickisch