Sciweavers

1763 search results - page 28 / 353
» Dependent random choice
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
JELIA
2000
Springer
14 years 18 days ago
A Logic for Modeling Decision Making with Dynamic Preferences
We present a framework for decision making with the possibility to express circumstance-dependent preferences among different alternatives for a decision. This new formalism, Order...
Marina De Vos, Dirk Vermeir
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 10 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
ISSTA
2007
ACM
13 years 10 months ago
Experimental assessment of random testing for object-oriented software
Progress in testing requires that we evaluate the effectiveness of testing strategies on the basis of hard experimental evidence, not just intuition or a priori arguments. Random ...
Ilinca Ciupa, Andreas Leitner, Manuel Oriol, Bertr...
CORR
2002
Springer
97views Education» more  CORR 2002»
13 years 8 months ago
Classification of Random Boolean Networks
We provide the first classification of different types of Random Boolean Networks (RBNs). We study the differences of RBNs depending on the degree of synchronicity and determinism...
Carlos Gershenson