Sciweavers

2763 search results - page 42 / 553
» The Dangerous 'All' in Specifications
Sort
View
IJAR
2008
83views more  IJAR 2008»
13 years 8 months ago
Decision-theoretic specification of credal networks: A unified language for uncertain modeling with sets of Bayesian networks
Credal networks are models that extend Bayesian nets to deal with imprecision in probability, and can actually be regarded as sets of Bayesian nets. Credal nets appear to be power...
Alessandro Antonucci, Marco Zaffalon
BMCBI
2005
141views more  BMCBI 2005»
13 years 7 months ago
A method for the prediction of GPCRs coupling specificity to G-proteins using refined profile Hidden Markov Models
Background: G- Protein coupled receptors (GPCRs) comprise the largest group of eukaryotic cell surface receptors with great pharmacological interest. A broad range of native ligan...
Nikolaos G. Sgourakis, Pantelis G. Bagos, Panagiot...
TVLSI
2010
13 years 2 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
KDD
2001
ACM
211views Data Mining» more  KDD 2001»
14 years 8 months ago
Magical thinking in data mining: lessons from CoIL challenge 2000
CoIL challenge 2000 was a supervised learning contest that attracted 43 entries. The authors of 29 entries later wrote explanations of their work. This paper discusses these repor...
Charles Elkan
MOBILWARE
2009
ACM
14 years 2 months ago
A Mission Management Framework for Unmanned Autonomous Vehicles
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. UA...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...