Sciweavers

683 search results - page 95 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
136
Voted
CASES
2003
ACM
15 years 8 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
145
Voted
BMCBI
2005
157views more  BMCBI 2005»
15 years 3 months ago
Statistical Viewer: a tool to upload and integrate linkage and association data as plots displayed within the Ensembl genome bro
Background: To facilitate efficient selection and the prioritization of candidate complex disease susceptibility genes for association analysis, increasingly comprehensive annotat...
Judith E. Stenger, Hong Xu, Carol Haynes, Elizabet...
130
Voted
CVPR
2007
IEEE
15 years 9 months ago
Hierarchical Structuring of Data on Manifolds
Manifold learning methods are promising data analysis tools. However, if we locate a new test sample on the manifold, we have to find its embedding by making use of the learned e...
Jun Li, Pengwei Hao
BMCBI
2007
173views more  BMCBI 2007»
15 years 3 months ago
Recursive Cluster Elimination (RCE) for classification and feature selection from gene expression data
Background: Classification studies using gene expression datasets are usually based on small numbers of samples and tens of thousands of genes. The selection of those genes that a...
Malik Yousef, Segun Jung, Louise C. Showe, Michael...
ATAL
2009
Springer
15 years 10 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...