Sciweavers

15375 search results - page 366 / 3075
» cans 2008
Sort
View
TCS
2008
15 years 4 months ago
Computational self-assembly
The object of this paper is to appreciate the computational limits inherent in the combinatorics of an applied concurrent (aka agent-based) language . That language is primarily m...
Pierre-Louis Curien, Vincent Danos, Jean Krivine, ...
JAIR
2007
103views more  JAIR 2007»
15 years 4 months ago
Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms
Reputation mechanisms offer an effective alternative to verification authorities for building trust in electronic markets with moral hazard. Future clients guide their business...
Radu Jurca, Boi Faltings
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 3 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 11 months ago
On Automated Trigger Event Generation in Post-Silicon Validation
When searching for functional bugs in silicon, debug data is acquired after a trigger event occurs. A trigger event can be configured at run-time using a set of control registers...
Ho Fai Ko, Nicola Nicolici
ICPR
2008
IEEE
15 years 11 months ago
Alternative similarity functions for graph kernels
Given a bipartite graph of collaborative ratings, the task of recommendation and rating prediction can be modeled with graph kernels. We interpret these graph kernels as the inver...
Jérôme Kunegis, Andreas Lommatzsch, C...