Sciweavers

15351 search results - page 2700 / 3071
» The information bottleneck method
Sort
View
141
Voted
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
JDCTA
2008
83views more  JDCTA 2008»
15 years 4 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong
CORR
2007
Springer
107views Education» more  CORR 2007»
15 years 4 months ago
Morphological annotation of Korean with Directly Maintainable Resources
This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to p...
Ivan Berlocher, Hyun-Gue Huh, Eric Laporte, Jee-Su...
CPHYSICS
2007
126views more  CPHYSICS 2007»
15 years 4 months ago
Adaptive continuation algorithms for computing energy levels of rotating Bose-Einstein condensates
We describe adaptive continuation algorithms for computing energy levels of the Bose–Einstein condensates (BEC) with emphasis on the rotating BEC. We show that the rotating BEC ...
S.-L. Chang, C.-S. Chien
CSDA
2007
88views more  CSDA 2007»
15 years 4 months ago
A study of partial F tests for multiple linear regression models
Partial F tests play a central role in model selections in multiple linear regression models. This paper studies the partial F tests from the view point of simultaneous confidence...
Mortaza Jamshidian, Robert I. Jennrich, Wei Liu
« Prev « First page 2700 / 3071 Last » Next »