Sciweavers

1303 search results - page 234 / 261
» ACTIVIEW: Adaptive data presentation using SuperSQL
Sort
View
SADFE
2008
IEEE
14 years 2 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
PPSN
2004
Springer
14 years 1 months ago
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person’s...
Jingpeng Li, Uwe Aickelin
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 29 days ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
ECML
2003
Springer
14 years 28 days ago
Logistic Model Trees
Abstract. Tree induction methods and linear models are popular techniques for supervised learning tasks, both for the prediction of nominal classes and continuous numeric values. F...
Niels Landwehr, Mark Hall, Eibe Frank
VISUALIZATION
2005
IEEE
14 years 1 months ago
Texture-Based Visualization of Uncertainty in Flow Fields
In this paper, we present two novel texture-based techniques to visualize uncertainty in time-dependent 2D flow fields. Both methods use semi-Lagrangian texture advection to sho...
Ralf P. Botchen, Daniel Weiskopf