Sciweavers

4007 search results - page 558 / 802
» Computation with imprecise probabilities
Sort
View
ICMT
2010
Springer
15 years 3 months ago
Implementing Business Process Recovery Patterns through QVT Transformations
Traditionally, software maintenance takes only technical information into account to evolve legacy systems. However, business knowledge, which could help to improve the comprehensi...
Ricardo Pérez-Castillo, Ignacio Garcí...
IEICET
2010
80views more  IEICET 2010»
15 years 3 months ago
Theoretical Analysis of Density Ratio Estimation
Density ratio estimation has gathered a great deal of attention recently since it can be used for various data processing tasks. In this paper, we consider three methods of densit...
Takafumi Kanamori, Taiji Suzuki, Masashi Sugiyama
IJAR
2010
91views more  IJAR 2010»
15 years 3 months ago
Logical and algorithmic properties of stable conditional independence
The logical and algorithmic properties of stable conditional independence (CI) as an alternative structural representation of conditional independence information are investigated...
Mathias Niepert, Dirk Van Gucht, Marc Gyssens
SMA
2008
ACM
192views Solid Modeling» more  SMA 2008»
15 years 3 months ago
Identification of sections from engineering drawings based on evidence theory
View identification is the basal process for solid reconstruction from engineering drawings. A new method is presented to label various views from a section-involved drawing and i...
Jie-Hui Gong, Hui Zhang, Bin Jiang, Jia-Guang Sun
IWSEC
2010
Springer
15 years 3 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo