Sciweavers

136 search results - page 7 / 28
» separable and transitive graphoids
Sort
View
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
TOPNOC
2010
13 years 2 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
ICML
2008
IEEE
14 years 8 months ago
Topologically-constrained latent variable models
In dimensionality reduction approaches, the data are typically embedded in a Euclidean latent space. However for some data sets this is inappropriate. For example, in human motion...
Raquel Urtasun, David J. Fleet, Andreas Geiger, Jo...
NAACL
2010
13 years 5 months ago
Creating Local Coherence: An Empirical Assessment
Two of the mechanisms for creating natural transitions between adjacent sentences in a text, resulting in local coherence, involve discourse relations and switches of focus of att...
Annie Louis, Ani Nenkova
LPNMR
2007
Springer
14 years 1 months ago
Using Answer Sets to Solve Belief Change Problems
We describe BE, an implemented system for solving belief change problems in the presence of actions. We illustrate how we can use BE to compute the result of belief progression, be...
Aaron Hunter, James P. Delgrande, Joel Faber