Sciweavers

71 search results - page 3 / 15
» What Ants Cannot Do
Sort
View
ECSA
2010
Springer
13 years 8 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
BIOINFORMATICS
2006
92views more  BIOINFORMATICS 2006»
13 years 8 months ago
What should be expected from feature selection in small-sample settings
Motivation: High-throughput technologies for rapid measurement of vast numbers of biological variables offer the potential for highly discriminatory diagnosis and prognosis; howev...
Chao Sima, Edward R. Dougherty
DAC
1999
ACM
14 years 26 days ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...
DLOG
2003
13 years 10 months ago
From Description Logic Provers to Knowledge Representation Systems
A description-logic based knowledge representation system is more than an inference engine for a particular description logic. A knowledge representation system must provide a num...
Deborah L. McGuinness, Peter F. Patel-Schneider
ECCC
2008
99views more  ECCC 2008»
13 years 8 months ago
Parallel Repetition in Projection Games and a Concentration Bound
In a two player game, a referee asks two cooperating players (who are not allowed to communicate) questions sampled from some distribution and decides whether they win or not base...
Anup Rao