Sciweavers

122 search results - page 18 / 25
» Structure in Errors: A Case Study in Fingerprint Verificatio...
Sort
View
ISSAC
2007
Springer
106views Mathematics» more  ISSAC 2007»
14 years 1 months ago
Numerical techniques for computing the inertia of products of matrices of rational numbers
Consider a rational matrix, particularly one whose entries have large numerators and denominators, but which is presented as a product of very sparse matrices with relatively smal...
John P. May, B. David Saunders, David Harlan Wood
POPL
2009
ACM
14 years 8 months ago
Compositional shape analysis by means of bi-abduction
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. The analysis uses an abstract domain based on a restricted frag...
Cristiano Calcagno, Dino Distefano, Peter W. O'Hea...
BMCBI
2010
158views more  BMCBI 2010»
13 years 7 months ago
A Bayesian network approach to feature selection in mass spectrometry data
Background: Time-of-flight mass spectrometry (TOF-MS) has the potential to provide non-invasive, high-throughput screening for cancers and other serious diseases via detection of ...
Karl W. Kuschner, Dariya I. Malyarenko, William E....
CATS
2008
13 years 9 months ago
Verifying Michael and Scott's Lock-Free Queue Algorithm using Trace Reduction
Lock-free algorithms have been developed to avoid various problems associated with using locks to control access to shared data structures. These algorithms are typically more int...
Lindsay Groves
ICSM
2007
IEEE
14 years 1 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...