Sciweavers

1411 search results - page 242 / 283
» Case Studies of an Insider Framework
Sort
View
DAM
2008
99views more  DAM 2008»
13 years 9 months ago
Boundary value problems on weighted networks
We present here a systematic study of general boundary value problems on weighted networks that includes the variational formulation of such problems. In particular, we obtain the...
Enrique Bendito, Angeles Carmona, Andrés M....
ENTCS
2008
110views more  ENTCS 2008»
13 years 8 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
BIB
2006
84views more  BIB 2006»
13 years 8 months ago
Computational methodologies for modelling, analysis and simulation of signalling networks
This article is a critical review of computational techniques used to model, analyse and simulate signalling networks. We propose a conceptual framework, and discuss the role of s...
David R. Gilbert, Hendrik Fuß, Xu Gu, Richar...
CSDA
2006
71views more  CSDA 2006»
13 years 8 months ago
Practical representations of incomplete probabilistic knowledge
This article deals with the compact representation of incomplete probabilistic knowledge which can be encountered in risk evaluation problems, for instance in environmental studie...
Cédric Baudrit, Didier Dubois
ENTCS
2006
104views more  ENTCS 2006»
13 years 8 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas