Sciweavers

334 search results - page 62 / 67
» A parametric analysis of the state-explosion problem in mode...
Sort
View
LICS
1999
IEEE
13 years 11 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
13 years 11 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
CSCW
1998
ACM
13 years 11 months ago
Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System
Collaborative filtering systems help address information overload by using the opinions of users in a community to make personal recommendations for documents to each user. Many c...
Badrul M. Sarwar, Joseph A. Konstan, Al Borchers, ...
EDOC
2004
IEEE
13 years 11 months ago
A Framework for Integrating Business Processes and Business Requirements
Service-oriented architectures and Web service infrastructure provide the ideal framework for interconnecting organizations and for defining distributed business applications. The...
Raman Kazhamiakin, Marco Pistore, Marco Roveri
FMICS
2006
Springer
13 years 11 months ago
"To Store or Not To Store" Reloaded: Reclaiming Memory on Demand
Behrmann et al. posed the question whether "To Store or Not To Store" [1] states during reachability analysis, in order to counter the effects of the well-known state spa...
Moritz Hammer, Michael Weber