Sciweavers

11017 search results - page 32 / 2204
» Closure Systems and their Structure
Sort
View
ML
1998
ACM
131views Machine Learning» more  ML 1998»
13 years 7 months ago
Learning from Examples and Membership Queries with Structured Determinations
It is well known that prior knowledge or bias can speed up learning, at least in theory. It has proved di cult to make constructive use of prior knowledge, so that approximately c...
Prasad Tadepalli, Stuart J. Russell
ICICS
2005
Springer
14 years 1 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
CADE
2009
Springer
14 years 8 months ago
Beyond Dependency Graphs
The dependency pair framework is a powerful technique for proving termination of rewrite systems. One of the most frequently used methods within the dependency pair framework is t...
Martin Korp, Aart Middeldorp
SG
2009
Springer
14 years 2 months ago
GPSel: A Gestural Perceptual-Based Path Selection Technique
This paper introduces a gestural perceptual-based approach to select objects, i.e., nodes and/or edges along paths. Based on known results from perception research, we propose a mo...
Hoda Dehmeshki, Wolfgang Stürzlinger
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 2 months ago
Courier Assignment in Social Networks
Integration is important in politics, business, and technology. In all these fields, the definition of integration is vague. We build a formal measure of integration based on the ...
Jeffrey V. Nickerson, Stephan Olariu