Sciweavers

3318 search results - page 588 / 664
» The Weak Instance Model
Sort
View
CSDA
2006
122views more  CSDA 2006»
13 years 10 months ago
The fuzzy approach to statistical analysis
For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are:...
Renato Coppi, María Angeles Gil, Henk A. L....
IANDC
2006
97views more  IANDC 2006»
13 years 10 months ago
Pure bigraphs: Structure and dynamics
Abstract Bigraphs are graphs whose nodes may be nested, representing locality, independently of the edges connecting them. They may be equipped with reaction rules, forming a bigra...
Robin Milner
CN
2007
99views more  CN 2007»
13 years 10 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
CORR
2007
Springer
107views Education» more  CORR 2007»
13 years 10 months ago
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal’s income is exposed to non-hedgeable risk factors ar...
U. Horst, S. Moreno
ISI
2006
Springer
13 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu