Sciweavers

3108 search results - page 615 / 622
» The Elements of Computer Credibility
Sort
View
COR
2007
106views more  COR 2007»
13 years 7 months ago
On a stochastic sequencing and scheduling problem
We present a framework for solving multistage pure 0–1 programs for a widely used sequencing and scheduling problem with uncertainty in the objective function coefficients, the...
Antonio Alonso-Ayuso, Laureano F. Escudero, M. Ter...
TCOM
2008
146views more  TCOM 2008»
13 years 7 months ago
Noncoherent eigenbeamforming and interference suppression for outdoor OFDM systems
Abstract--We investigate a new approach to uplink communications in wideband outdoor cellular systems that can take advantage of multiple antennas at the base station in a scalable...
Noah Jacobsen, Gwen Barriac, Upamanyu Madhow
CGF
2010
142views more  CGF 2010»
13 years 6 months ago
Toward a Lagrangian Vector Field Topology
In this paper we present an extended critical point concept which allows us to apply vector field topology in the case of unsteady flow. We propose a measure for unsteadiness wh...
Raphael Fuchs, Jan Kemmler, Benjamin Schindler, J&...
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 6 months ago
Monte Carlo Methods for Top-k Personalized PageRank Lists and Name Disambiguation
We study a problem of quick detection of top-k Personalized PageRank lists. This problem has a number of important applications such as finding local cuts in large graphs, estima...
Konstantin Avrachenkov, Nelly Litvak, Danil Nemiro...
ISSRE
2010
IEEE
13 years 6 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...