Sciweavers

1646 search results - page 207 / 330
» Validation Measures in CMMI
Sort
View
MICCAI
2009
Springer
14 years 6 months ago
Constrained Data Decomposition and Regression for Analyzing Healthy Aging from Fiber Tract Diffusion Properties
Abstract. It has been shown that brain structures in normal aging undergo significant changes attributed to neurodevelopmental and neurodegeneration processes as a lifelong, dynami...
Sylvain Gouttard, Marcel Prastawa, Elizabeth Bulli...
SAC
2010
ACM
14 years 4 months ago
Hypothesis generation and ranking based on event similarities
Accelerated by the technological advances in the domain, the size of the biomedical literature has been growing rapidly. As a result, it is not feasible for individual researchers...
Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara
WOSP
2010
ACM
14 years 4 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi
TMA
2010
Springer
212views Management» more  TMA 2010»
14 years 4 months ago
EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network
The paper describes the EmPath tool that was designed to emulate packet transfer characteristics as delays and losses in IP network. The main innovation of this tool is its ability...
Jaroslaw Sliwinski, Andrzej Beben, Piotr Krawiec
ACSAC
2009
IEEE
14 years 4 months ago
Symmetric Cryptography in Javascript
—We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, a...
Emily Stark, Michael Hamburg, Dan Boneh