Sciweavers

1328 search results - page 177 / 266
» Cut-free common knowledge
Sort
View
RSCTC
2004
Springer
164views Fuzzy Logic» more  RSCTC 2004»
15 years 10 months ago
Rough Set Methodology in Clinical Practice: Controlled Hospital Trial of the MET System
Abstract. Acute abdominal pain in childhood is a common but diagnostically challenging problem facing Emergency Department personnel. Experienced physicians use a combination of ke...
Ken Farion, Wojtek Michalowski, Roman Slowinski, S...
WISA
2004
Springer
15 years 9 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
INFOCOM
2003
IEEE
15 years 9 months ago
The Impact of Correlated Link Weights on QoS Routing
Abstract— Finding a path in a network based on multiple constraints (the MCP problem) is often referred to as QoS routing. QoS routing with constraints on multiple additive metri...
Fernando A. Kuipers, Piet Van Mieghem
IWPC
2003
IEEE
15 years 9 months ago
Facilitating Program Comprehension by Mining Association Rules from Source Code
Program comprehension is an important part of software maintenance, especially when program structure is complex and documentation is unavailable or outdated. Data mining can prod...
Christos Tjortjis, Loukas Sinos, Paul J. Layzell