Sciweavers

2135 search results - page 82 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ACL
1992
13 years 9 months ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
ACSAC
1999
IEEE
14 years 14 days ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
EKAW
2006
Springer
13 years 11 months ago
Iterative Bayesian Network Implementation by Using Annotated Association Rules
Abstract. This paper concerns the iterative implementation of a knowledge model in a data mining context. Our approach relies on coupling a Bayesian network design with an associat...
Clément Fauré, Sylvie Delprat, Jean-...
JSS
2007
109views more  JSS 2007»
13 years 7 months ago
Using Bayesian belief networks for change impact analysis in architecture design
Research into design rationale in the past has focused on argumentation-based design deliberations. These approaches cannot be used to support change impact analysis effectively ...
Antony Tang, Ann E. Nicholson, Yan Jin, Jun Han
JMLR
2010
157views more  JMLR 2010»
13 years 6 months ago
Kronecker Graphs: An Approach to Modeling Networks
How can we generate realistic networks? In addition, how can we do so with a mathematically tractable model that allows for rigorous analysis of network properties? Real networks ...
Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinb...