Sciweavers

2873 search results - page 479 / 575
» Model Checking and the Mu-calculus
Sort
View
LICS
1999
IEEE
14 years 8 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
14 years 8 days ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
KBSE
1998
IEEE
14 years 7 days ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green
CSCW
1998
ACM
14 years 7 days ago
Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System
Collaborative filtering systems help address information overload by using the opinions of users in a community to make personal recommendations for documents to each user. Many c...
Badrul M. Sarwar, Joseph A. Konstan, Al Borchers, ...
STOC
1998
ACM
125views Algorithms» more  STOC 1998»
14 years 7 days ago
Spot-Checkers
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Funda Ergün, Sampath Kannan, Ravi Kumar, Roni...