We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
We study the evolution of simple cells that are equipped with a genome, a rudimentary gene regulation network at transcription level and two classes of functional genes: motion e...
Camille Stephan-Otto Attolini, Peter F. Stadler, C...
Abstract. Radial basis function (RBF) kernels are widely used for support vector machines. But for model selection, we need to optimize the kernel parameter and the margin paramete...
In this work, we suggest a new feature selection technique that lets us use the wrapper approach for finding a well suited feature set for distinguishing experiment classes in hig...
Monitoring the real-time status of voluntary nodes is a basic task of Quality of Services (QoS) management in grid. The heterogeneity of distributed host resources is an obvious ob...