Sciweavers

18016 search results - page 3544 / 3604
» Data Mining - Concepts and Techniques
Sort
View
DALT
2008
Springer
13 years 10 months ago
Abstracting and Verifying Strategy-Proofness for Auction Mechanisms
ing and Verifying Strategy-proofness for Auction Mechanisms E. M. Tadjouddine, F. Guerin, and W. Vasconcelos Department of Computing Science, King's College, University of Abe...
Emmanuel M. Tadjouddine, Frank Guerin, Wamberto We...
ECOOPW
2008
Springer
13 years 10 months ago
Getting Farther on Software Evolution via AOP and Reflection
Following last four years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE'08 workshop was a successful and pop...
Manuel Oriol, Walter Cazzola, Shigeru Chiba, Gunte...
EKAW
2008
Springer
13 years 10 months ago
An Analysis of the Origin of Ontology Mismatches on the Semantic Web
Despite the potential of domain ontologies to provide consensual representations of domain-relevant knowledge, the open, distributed and decentralized nature of the Semantic Web me...
Paul R. Smart, Paula C. Engelbrecht
FMCAD
2008
Springer
13 years 10 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
IMC
2007
ACM
13 years 10 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
« Prev « First page 3544 / 3604 Last » Next »