LSC Verification for UML Models with Unbounded Creation and Destruction Fulltext Access 13 Pages 2006
Convexity in Helly Graphs: Selection and Almost Fixed Point Properties for Multifunctions Fulltext Access 13 Pages 2006
Convergence Routing under Bursty Traffic: Instability and an AIMD Controller 1 Fulltext Access 13 Pages 2006
Observing Internet Worm and Virus Attacks with a Small Network Telescope Fulltext Access 13 Pages 2006
Formal Verification of the Quasi-Static Behavior of Mixed-Signal Circuits by Property Checking Fulltext Access 13 Pages 2006
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs Fulltext Access 13 Pages 2006
Deriving Available Behavior All Out from Incompatible Component Compositions Fulltext Access 13 Pages 2006
On Interpolation Problem in Paraconsistent Extensions of the Minimal Logic Fulltext Access 13 Pages 2006
A Logical Uniform Boundedness Principle for Abstract Metric and Hyperbolic Spaces Fulltext Access 13 Pages 2006
Some simple optimization techniques for self-organized public key management in mobile ad hoc networks Fulltext Access 13 Pages 2006
The use of configurable computing for computational kernels in scientific simulations Fulltext Access 13 Pages 2006
Secure shared data-space coordination languages: A process algebraic survey Fulltext Access 13 Pages 2006
Software visualizations for improving and measuring the comprehensibility of source code Fulltext Access 13 Pages 2006
Rapid performance re-engineering of distributed embedded systems via latency analysis and k-level diagonal search Fulltext Access 13 Pages 2006
Average-case performance analysis of scheduling random parallel tasks with precedence constraints on mesh connected multicomputer systems Fulltext Access 13 Pages 2006
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols Fulltext Access 13 Pages 2006
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks Fulltext Access 13 Pages 2006
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software Fulltext Access 13 Pages 2006
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines Fulltext Access 13 Pages 2006
A component-based architecture for parallel multi-physics PDE simulation Fulltext Access 13 Pages 2006
A Component Model for Separation of Control Flow from Computation in Component-Based Systems Fulltext Access 13 Pages 2006
An Equivalence between Dependencies in Nested Databases and a Fragment of Propositional Logic Fulltext Access 13 Pages 2006
Mining Propositional Simplification Proofs for Small Validating Clauses Fulltext Access 13 Pages 2006
The sizes of the three popular asymptotic tests for testing homogeneity of two binomial proportions Fulltext Access 13 Pages 2006
KNN-kernel density-based clustering for high-dimensional multivariate data Fulltext Access 13 Pages 2006
Statistical designs for two-color microarray experiments involving technical replication Fulltext Access 13 Pages 2006
Comparison of estimates using record statistics from Weibull model: Bayesian and non-Bayesian approaches Fulltext Access 13 Pages 2006
Variable selection in kernel Fisher discriminant analysis by means of recursive feature elimination Fulltext Access 13 Pages 2006
The specification of rank reducing observation sets in experimental design Fulltext Access 13 Pages 2006
Multiclass sparse logistic regression for classification of multiple cancer types using gene expression data Fulltext Access 13 Pages 2006
Extension of the SAEM algorithm to left-censored data in nonlinear mixed-effects model: Application to HIV dynamics model Fulltext Access 13 Pages 2006
Accelerating the convergence of the EM algorithm using the vector εε algorithm Fulltext Access 13 Pages 2006
Analysis of longitudinal data with intermittent missing values using the stochastic EM algorithm Fulltext Access 13 Pages 2006
Modelling the mean of a doubly stochastic Poisson process by functional data analysis Fulltext Access 13 Pages 2006
Estimating the linear regression model with categorical covariates subject to randomized response Fulltext Access 13 Pages 2006
Complexity of constructing solutions in the core based on synergies among coalitions Fulltext Access 13 Pages 2006
Discovering the linear writing order of a two-dimensional ancient hieroglyphic script Fulltext Access 13 Pages 2006
A Maiorana–McFarland type construction for resilient Boolean functions on n variables (n even) with nonlinearity >2n-1-2n/2+2n/2-2>2n-1-2n/2+2n/2-2 Fulltext Access 13 Pages 2006
Review of combinatorial problems induced by spatial forest harvesting planning Fulltext Access 13 Pages 2006
Fast algorithms for identifying maximal common connected sets of interval graphs Fulltext Access 13 Pages 2006
Enumeration of perfect matchings of a type of Cartesian products of graphs Fulltext Access 13 Pages 2006
Factoring and recognition of read-once functions using cographs and normality and the readability of functions associated with partial k-trees Fulltext Access 13 Pages 2006
A two-stage empirical Bayes method for identifying differentially expressed genes Fulltext Access 13 Pages 2006
Efficiency evaluation of MEV spatial sampling strategies: a scenario analysis Fulltext Access 13 Pages 2006
Multivariate distributions with correlation matrices for nonlinear repeated measurements Fulltext Access 13 Pages 2006
Threshold-based clustering with merging and regularization in application to network intrusion detection Fulltext Access 13 Pages 2006
Automatic dimensionality selection from the scree plot via the use of profile likelihood Fulltext Access 13 Pages 2006
Very accurate posterior approximations based on finite mixtures of the hyperparameters conditionals Fulltext Access 13 Pages 2006
Financial econometric analysis at ultra-high frequency: Data handling concerns Fulltext Access 14 Pages 2006
A class of nonlinear stochastic volatility models and its implications for pricing currency options Fulltext Access 14 Pages 2006