Sciweavers

834 search results - page 119 / 167
» Anaphora and the Logic of Change
Sort
View
CCS
2005
ACM
14 years 1 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
DIS
2005
Springer
14 years 1 months ago
Movement Analysis of Medaka (Oryzias Latipes) for an Insecticide Using Decision Tree
Abstract. Behavioral sequences of the medaka (Oryzias latipes) were continuously investigated through an automatic image recognition system in response to medaka treated with the i...
Sengtai Lee, Jeehoon Kim, Jae-Yeon Baek, Man-Wi Ha...
FSKD
2005
Springer
90views Fuzzy Logic» more  FSKD 2005»
14 years 1 months ago
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets
The value of the itemset share is one way of evaluating the magnitude of an itemset. From business perspective, itemset share values reflect more the significance of itemsets for m...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
14 years 1 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
ICN
2005
Springer
14 years 1 months ago
Client-Controlled QoS Management in Networked Virtual Environments
In this paper, we propose an architecture to regulate the bandwidth usage of multimedia streams in networked virtual environments. In this architecture, intelligent proxies are pla...
Patrick Monsieurs, Maarten Wijnants, Wim Lamotte