Sciweavers

1587 search results - page 49 / 318
» What's my method
Sort
View
BIOSURVEILLANCE
2007
Springer
14 years 4 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper
ICSE
2007
IEEE-ACM
14 years 10 months ago
Agile Methods: Crossing the Chasm
An armada of emerging agile methods of software development (with eXtreme Programming and Scrum being the most broadly used) is both gaining popularity and generating lots of cont...
Frank Maurer, Grigori Melnik
CISIM
2007
IEEE
14 years 4 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
TABLEAUX
2005
Springer
14 years 3 months ago
Comparing Instance Generation Methods for Automated Reasoning
Abstract. The clause linking technique of Lee and Plaisted proves the unsatisfiability of a set of first-order clauses by generating a sufficiently large set of instances of thes...
Swen Jacobs, Uwe Waldmann
MMMACNS
2001
Springer
14 years 2 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows