Sciweavers

169 search results - page 12 / 34
» arcs 2007
Sort
View
IJAR
2007
130views more  IJAR 2007»
13 years 7 months ago
Bayesian network learning algorithms using structural restrictions
The use of several types of structural restrictions within algorithms for learning Bayesian networks is considered. These restrictions may codify expert knowledge in a given domai...
Luis M. de Campos, Javier Gomez Castellano
NETWORKS
2007
13 years 7 months ago
Survivable IP network design with OSPF routing
Internet protocol (IP) traffic follows rules established by routing protocols. Shortest path based protocols, such as Open Shortest Path First (OSPF), direct traffic based on arc w...
Luciana S. Buriol, Mauricio G. C. Resende, Mikkel ...
ISIM
2007
13 years 9 months ago
Deriving Prototypes from UML 2.0 Sequence Diagrams
Executable prototypcs generatcd on early stages of software development bring many benefits, first of all they help to develop and validate systcm's spccification. The paper p...
Zbigniew Huzar, Grzegorz Loniewski
EPK
2006
107views Management» more  EPK 2006»
13 years 9 months ago
Towards EPC Semantics based on State and Context
: The semantics of the OR-join have been discussed for some time, in the context of EPCs, but also in the context of other business process modeling languages like YAWL. In this pa...
Jan Mendling, Wil M. P. van der Aalst
ARC
2007
Springer
119views Hardware» more  ARC 2007»
14 years 1 months ago
Authentication of FPGA Bitstreams: Why and How
Abstract. Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authenticati...
Saar Drimer