Sciweavers

1036 search results - page 67 / 208
» Utilizing Validation Experience for System Validation
Sort
View
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
13 years 9 months ago
Quadratic Programming based data assimilation with passive drifting sensors for shallow water flows
We present a method for assimilating Lagrangian sensor measurement data into a Shallow Water Equation model. Using our method, the variational data assimilation problem is formulat...
Andrew Tinka, Issam S. Strub, Qingfang Wu, Alexand...
JSAC
2007
155views more  JSAC 2007»
13 years 7 months ago
Semantic social overlay networks
— Peer selection for query routing is a core task in peer-to-peer networks. Unstructured peer-to-peer systems (like Gnutella) ignore this problem, leading to an abundance of netw...
Alexander Löser, Steffen Staab, Christoph Tem...
BMCBI
2008
166views more  BMCBI 2008»
13 years 8 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
OSDI
1996
ACM
13 years 9 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
DSN
2008
IEEE
13 years 9 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie