Sciweavers

1988 search results - page 343 / 398
» Engineering formal metatheory
Sort
View
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
14 years 11 days ago
Inference of genetic networks using S-system: information criteria for model selection
In this paper we present an evolutionary approach for inferring the structure and dynamics in gene circuits from observed expression kinetics. For representing the regulatory inte...
Nasimul Noman, Hitoshi Iba
FC
2000
Springer
106views Cryptology» more  FC 2000»
14 years 10 days ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
AAAI
2008
13 years 11 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
ACMSE
2008
ACM
13 years 10 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
DAWAK
2006
Springer
13 years 10 months ago
Towards Multidimensional Requirement Design
Abstract. Data warehouses (DW) main objective is to facilitating decisionmaking. Thus their development has to take into account DW project actor requirements. While much recent re...
Estella Annoni, Franck Ravat, Olivier Teste, Gille...