• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 31
Next 10 →

Chapter 12 Rough Sets and Rough Logic: A KDD Perspective

by Zdzis Law Pawlak, Lech Polkowski, Andrzej Skowron
"... Abstract Basic ideas of rough set theory were proposed by Zdzis law Pawlak [85, 86] in the early 1980’s. In the ensuing years, we have witnessed a systematic, world–wide growth of interest in rough sets and their applications. The main goal of rough set analysis is induction of approximations of con ..."
Abstract - Add to MetaCart
Abstract Basic ideas of rough set theory were proposed by Zdzis law Pawlak [85, 86] in the early 1980’s. In the ensuing years, we have witnessed a systematic, world–wide growth of interest in rough sets and their applications. The main goal of rough set analysis is induction of approximations

QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS

by V. Rhymend, Uthariaraj P. Mercy, Florence A. Geetha
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract - Add to MetaCart
simulations and a set of experiments based on an implementation of an adaptive service-based system for remote medical assistance.

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case

unknown title

by unknown authors
"... considered in performance predictions. Most existing approaches use established prediction models [3, 18] to estimate the performance of already existing complex software systems. Their main focus lies on the questions: i) ”How can we automatically derive or extract the models we need? ” and ii) ”Ho ..."
Abstract - Add to MetaCart
and monitoring of the system to extract model parameters. In order to apply these approaches, software architects have to instrument large parts of the system and conduct precise measurements. Furthermore, they are bound to the assumptions of the prediction model used. For example, if a network connection

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography

i A TRANSIENT COMPUTATIONAL FLUID DYNAMIC STUDY OF A LABORATORY-SCALE FLUORINE

by Ryno Pretorius, Supervisor Prof, P. L. Crouse, Electrolysis Cell
"... Fluorine gas is produced industrially by electrolysing hydrogen fluoride in a potassium acid fluoride electrolyte. Fluorine is produced at the carbon anode, while hydrogen is produced at the mild-steel cathode. The fluorine produced has a wide range of uses, most notably in the nuclear industry wher ..."
Abstract - Add to MetaCart
is to construct a model that can accurately predict the physical processes involved in the production of fluorine gas. The results of the simulation will be compared to experimental results from tests done on a lab-scale reactor. A good correlation

ACKNOWLEDGMENTS

by Jennifer E. Michaels, Maysam Ghovanloo, James H. Mcclellan, Michael J. Leamy, George W. Woodruff, Laurence J. Jacobs, Thomas E. Michaels , 2011
"... First and foremost, I would like to thank my advisor, Prof. Jennifer E. Michaels. I am most appreciative of your guidance over the last four years, from the basics of elastic waves to both short- and long-term career advice. I have grown a tremendous amount, both profes-sionally and personally, and ..."
Abstract - Add to MetaCart
First and foremost, I would like to thank my advisor, Prof. Jennifer E. Michaels. I am most appreciative of your guidance over the last four years, from the basics of elastic waves to both short- and long-term career advice. I have grown a tremendous amount, both profes-sionally and personally

Active Mask Framework for Segmentation of Fluorescence Microscope Images

by Gowri Srinivasa, Advisor Prof, Prof Matthew, C. Fickus, Prof Adam, D. Linstedt, Prof Robert, F. Murphy
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract - Add to MetaCart
facilitated the task of understanding complex sys-tems at cellular and molecular levels in recent years. Segmentation, an important yet dif-ficult problem, is often the first processing step following acquisition. Our team previously demonstrated that a stochastic active contour based algorithm together

under a Creative Commons Attribution Non-Commercial No Derivatives

by Sira Gonzalez, Deparment Of Electrical, Electronic Engineering , 2013
"... the condition that they attribute it, that they do not use it for commercial purposes and that they do not alter, transform or build upon it. For any reuse or redistribution, researchers must make clear to others the licence terms of this work. ..."
Abstract - Add to MetaCart
the condition that they attribute it, that they do not use it for commercial purposes and that they do not alter, transform or build upon it. For any reuse or redistribution, researchers must make clear to others the licence terms of this work.

Digital Repository @ Iowa State University

by David Michael Failing, David Michael Failing, Jonathan D. H. Smith, Sung-yell Song
"... Commutative, idempotent groupoids and the ..."
Abstract - Add to MetaCart
Commutative, idempotent groupoids and the
Next 10 →
Results 1 - 10 of 31
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University