Sciweavers

495 search results - page 76 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
AI
2006
Springer
13 years 9 months ago
Discovering the linear writing order of a two-dimensional ancient hieroglyphic script
This paper demonstrates how machine learning methods can be applied to deal with a realworld decipherment problem where very little background knowledge is available. The goal is ...
Shou de Lin, Kevin Knight
MP
2006
75views more  MP 2006»
13 years 9 months ago
A Class of stochastic programs with decision dependent uncertainty
We address a class of problems where decisions have to be optimized over a time horizon given that the future is uncertain and that the optimization decisions influence the time o...
Vikas Goel, Ignacio E. Grossmann
ITIIS
2008
149views more  ITIIS 2008»
13 years 8 months ago
Sharing e-Learning Object Metadata Using ebXML Registries for Semantic Grid Computing
To facilitate the processes of e-learning resource description, discovery and reuse, e-learning objects should be appropriately described and classified using standard metadata th...
Hyoung Do Kim
FGR
2000
IEEE
128views Biometrics» more  FGR 2000»
14 years 2 months ago
Understanding Purposeful Human Motion
Human motion can be understood on many levels. The most basic level is the notion that humans are collections of things that have predictable visual appearance. Next is the notion...
Christopher Richard Wren, Brian P. Clarkson, Alex ...
FOSSACS
2005
Springer
14 years 3 months ago
Model Checking for Nominal Calculi
Nominal calculi have been shown very effective to formally model a variety of computational phenomena. The models of nominal calculi have often infinite states, thus making model ...
Gian Luigi Ferrari, Ugo Montanari, Emilio Tuosto