Sciweavers

828 search results - page 80 / 166
» types 2000
Sort
View
ISW
2000
Springer
14 years 18 days ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
JSSPP
2000
Springer
14 years 18 days ago
Time-Sharing Parallel Jobs in the Presence of Multiple Resource Requirements
Abstract. Buffered coscheduling is a new methodology that can substantially increase resource utilization, improve response time, and simplify the development of the run-time suppo...
Fabrizio Petrini, Wu-chun Feng
KES
2000
Springer
14 years 18 days ago
Effects of antecedent pruning in fuzzy classification systems
Fuzzy classification rules are widely considered a well-suited representation of classification knowledge, as they allow readable and interpretable rule bases. The goal of this pa...
Andreas Nürnberger, Aljoscha Klose, Rudolf Kr...
OOPSLA
2000
Springer
14 years 18 days ago
An efficient class and object encoding
An object encoding translates a language with object primitives to one without. Similarly, a class encoding translates classes into other primitives. Both are important theoretica...
Neal Glew
PKDD
2000
Springer
123views Data Mining» more  PKDD 2000»
14 years 18 days ago
Supporting Discovery in Medicine by Association Rule Mining of Bibliographic Databases
The paper presents an interactive discovery support system for the field of medicine. The intended users of the system are medical researchers. The goal of the system is: for a giv...
Dimitar Hristovski, Saso Dzeroski, Borut Peterlin,...