Sciweavers

334 search results - page 63 / 67
» Survey of trust models in different network domains
Sort
View
ITCC
2002
IEEE
14 years 14 days ago
Design and Generation of Adaptable Web Information Systems with KIWIS
Web-based Information Systems (WIS) are now widely used for diffusing and processing information over the network. Methodological guidelines which assist WIS developers in their t...
Marlène Villanova-Oliver, Jérô...
DMIN
2009
144views Data Mining» more  DMIN 2009»
13 years 5 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
CONSTRAINTS
2010
126views more  CONSTRAINTS 2010»
13 years 5 months ago
Solving satisfiability problems with preferences
Abstract. Propositional satisfiability (SAT) is a success story in Computer Science and Artificial Intelligence: SAT solvers are currently used to solve problems in many different ...
Emanuele Di Rosa, Enrico Giunchiglia, Marco Marate...
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 9 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...