Sciweavers

1710 search results - page 211 / 342
» Sharing Engineering Information and Knowledge
Sort
View
APN
2008
Springer
13 years 11 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
DILS
2008
Springer
13 years 11 months ago
Semi Supervised Spectral Clustering for Regulatory Module Discovery
We propose a novel semi-supervised clustering method for the task of gene regulatory module discovery. The technique uses data on dna binding as prior knowledge to guide the proces...
Alok Mishra, Duncan Gillies
CISST
2003
88views Hardware» more  CISST 2003»
13 years 10 months ago
Virtual Experts for Imagery Registration and Conflation
The unique human expertise in imagery analysis should be preserved and shared with other imagery analysts to improve image analysis and decision-making. Such knowledge can serve a...
Boris Kovalerchuk, Artemus Harper, Michael Kovaler...
ECRA
2010
145views more  ECRA 2010»
13 years 9 months ago
Inferring preference correlations from social networks
Identifying consumer preferences is a key challenge in customizing electronic commerce sites to individual users. The increasing availability of online social networks provides on...
Tad Hogg
ISEM
2006
112views more  ISEM 2006»
13 years 9 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee