Sciweavers

1587 search results - page 88 / 318
» What's my method
Sort
View
ASM
2010
ASM
14 years 2 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
CEC
2005
IEEE
14 years 4 months ago
The fitness map scheme: application to interactive multifractal image denoising
AbstractInteractive evolutionary algorithms (IEA) often suffer from what is called the “user bottleneck.” In this paper, we propose and analyse a method to limit the user inter...
Evelyne Lutton, Mario Pilz, Jacques Lévy V&...
AEI
2007
75views more  AEI 2007»
13 years 11 months ago
Mining data from intensive care patients
In this paper we describe the application of data mining methods for predicting the evolution of patients in an intensive care unit. We discuss the importance of such methods for ...
Jan Ramon, Daan Fierens, Fabián Güiza,...
ENTCS
2006
145views more  ENTCS 2006»
13 years 11 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
ISMIS
2011
Springer
13 years 2 months ago
Evaluation of Feature Combination Approaches for Text Categorisation
Text categorisation relies heavily on feature selection. Both the possible reduction in dimensionality as well as improvements in classification performance are highly desirable. ...
Robert Neumayer, Kjetil Nørvåg