Sciweavers

6608 search results - page 1180 / 1322
» On the Completeness of Model Checking
Sort
View
149
Voted
AAAI
2008
15 years 6 months ago
Dormant Independence
The construction of causal graphs from non-experimental data rests on a set of constraints that the graph structure imposes on all probability distributions compatible with the gr...
Ilya Shpitser, Judea Pearl
APPROX
2008
Springer
127views Algorithms» more  APPROX 2008»
15 years 6 months ago
Approximating Single Machine Scheduling with Scenarios
In the field of robust optimization, the goal is to provide solutions to combinatorial problems that hedge against variations of the numerical parameters. This constitutes an effor...
Monaldo Mastrolilli, Nikolaus Mutsanas, Ola Svenss...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 6 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
C3S2E
2008
ACM
15 years 6 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
CEAS
2008
Springer
15 years 6 months ago
Personalized Spam Filtering for Gray Mail
Gray mail, messages that could reasonably be considered either spam or good by different email users, is a commonly observed issue in production spam filtering systems. In this pa...
Ming-Wei Chang, Scott Yih, Robert McCann
« Prev « First page 1180 / 1322 Last » Next »