Sciweavers

43264 search results - page 194 / 8653
» Comparing models of computation
Sort
View
ENTCS
2006
138views more  ENTCS 2006»
15 years 2 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
BALT
2010
14 years 9 months ago
Interoperability Services for Models and Ontologies
Model-based approaches in the UML/MOF technological space and ontology-based approaches in the OWL technological space both support conceptual modeling using different kinds of rep...
Jürgen Ebert, Tobias Walter
134
Voted
SAC
2002
ACM
15 years 2 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
109
Voted
ICML
2005
IEEE
16 years 3 months ago
Closed-form dual perturb and combine for tree-based models
This paper studies the aggregation of predictions made by tree-based models for several perturbed versions of the attribute vector of a test case. A closed-form approximation of t...
Pierre Geurts, Louis Wehenkel
112
Voted
ICCTA
2007
IEEE
15 years 8 months ago
Modeling Time-Varying Population for Biometric Authentication
Population size plays a major role in determining the performance of any biometric authentication system, particularly when such systems are used for civilian applications. In thi...
Vandana Roy, C. V. Jawahar