Sciweavers

JSYML
2002
70views more  JSYML 2002»
13 years 7 months ago
Coding with Ladders A Well Ordering of The Reals
Any model of ZFC + GCH has a generic extension (made with a poset of size 2) in which the following hold: MA + 20 = 2+ there exists a 2 1-well ordering of the reals. The proof con...
Uri Abraham, Saharon Shelah
DKE
1999
87views more  DKE 1999»
13 years 7 months ago
Logical Foundations of Multilevel Databases
In this paper, we propose a formal model for multilevel databases. This model aims at being a generic model, that is it can be interpreted for any kind of database (relational, ob...
Frédéric Cuppens, Alban Gabillon
JCS
1998
117views more  JCS 1998»
13 years 7 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia
JAIR
1998
89views more  JAIR 1998»
13 years 7 months ago
An Empirical Approach to Temporal Reference Resolution
Scheduling dialogs, during which people negotiate the times of appointments, are common in everyday life. This paper reports the results of an in-depth empirical investigation of ...
Janyce Wiebe, Thomas P. O'Hara, Thorsten Öhrs...
JIIS
2002
102views more  JIIS 2002»
13 years 7 months ago
Using Dempster-Shafer's Theory of Evidence to Combine Aspects of Information Use
In this paper we propose a model for relevance feedback. Our model combines evidence from user's relevance assessments with algorithms describing how words are used within do...
Ian Ruthven, Mounia Lalmas
JGS
2002
91views more  JGS 2002»
13 years 7 months ago
Toward micro-scale spatial modeling of gentrification
A simple preliminary model of gentrification is presented. The model is based on an irregular cellular automaton architecture drawing on the concept of proximal space, which is wel...
David O'Sullivan
JCS
2002
94views more  JCS 2002»
13 years 7 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
JCNS
2002
99views more  JCNS 2002»
13 years 7 months ago
Coarse-Grained Reduction and Analysis of a Network Model of Cortical Response: I. Drifting Grating Stimuli
We present a reduction of a large-scale network model of visual cortex developed by McLaughlin, Shapley, Shelley, and Wielaard. The reduction is from many integrate-and-fire neuron...
Michael Shelley, David McLaughlin
JCNS
2002
71views more  JCNS 2002»
13 years 7 months ago
A Spiking Neuron Model for Binocular Rivalry
Abstract. We present a biologically plausible model of binocular rivalry consisting of a network of HodgkinHuxley type neurons. Our model accounts for the experimentally and psycho...
Carlo R. Laing, Carson C. Chow
IJON
1998
95views more  IJON 1998»
13 years 7 months ago
Self-organization and segmentation in a laterally connected orientation map of spiking neurons
The RF-SLISSOM model integrates two separate lines of research on computational modeling of the visual cortex. Laterally connected self-organizing maps have been used to model how...
Yoonsuck Choe, Risto Miikkulainen