Sciweavers

459 search results - page 73 / 92
» Automated Learning of Rules Using Genetic Operators
Sort
View
AAAI
2011
12 years 7 months ago
Relational Blocking for Causal Discovery
Blocking is a technique commonly used in manual statistical analysis to account for confounding variables. However, blocking is not currently used in automated learning algorithms...
Matthew J. Rattigan, Marc E. Maier, David Jensen
ICLP
2010
Springer
13 years 11 months ago
Abductive Inference in Probabilistic Logic Programs
ABSTRACT. Action-probabilistic logic programs (ap-programs) are a class of probabilistic logic programs that have been extensively used during the last few years for modeling behav...
Gerardo I. Simari, V. S. Subrahmanian
CSL
2010
Springer
13 years 8 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ICWS
2009
IEEE
14 years 4 months ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: © Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 1 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht