Sciweavers

342 search results - page 47 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Scalable Clustering of Internet Paths by Shared Congestion
— Internet paths sharing the same bottleneck can be identified using several shared congestion detection techniques. However, all of these techniques have been designed to detec...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
CVPR
2008
IEEE
14 years 9 months ago
Particle filtering for registration of 2D and 3D point sets with stochastic dynamics
In this paper, we propose a particle filtering approach for the problem of registering two point sets that differ by a rigid body transformation. Typically, registration algorithm...
Romeil Sandhu, Samuel Dambreville, Allen Tannenbau...
BMCBI
2008
115views more  BMCBI 2008»
13 years 7 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
CAV
2006
Springer
95views Hardware» more  CAV 2006»
13 years 11 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik