Sciweavers

IJON
2008
156views more  IJON 2008»
13 years 9 months ago
Structural identifiability of generalized constraint neural network models for nonlinear regression
Identifiability becomes an essential requirement for learning machines when the models contain physically interpretable parameters. This paper presents two approaches to examining...
Shuang-Hong Yang, Bao-Gang Hu, Paul-Henry Courn&eg...
GEOINFORMATICA
2006
86views more  GEOINFORMATICA 2006»
13 years 9 months ago
Decreasing Computational Time of Urban Cellular Automata Through Model Portability
This paper investigates how portability of a model between different computer operating systems can lead to increased efficiency in code execution. The portability problem is not a...
Charles Dietzel, Keith C. Clarke
FUIN
2006
96views more  FUIN 2006»
13 years 9 months ago
A Component Coordination Model Based on Mobile Channels
In this paper we present a coordination model for component-based software systems based on the notion of mobile channels, define it in terms of a compositional trace-based semanti...
Juan Guillen Scholten, Farhad Arbab, Frank S. de B...
FUIN
2006
79views more  FUIN 2006»
13 years 9 months ago
Simple Gene Assembly Is Deterministic
We investigate in this paper a simple intramolecular model for gene assembly in ciliates. Unlike the general intramolecular model, the folds that a micronuclear chromosome may for...
Miika Langille, Ion Petre
FUIN
2006
142views more  FUIN 2006»
13 years 9 months ago
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Abstract. We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of ...
Magdalena Kacprzak, Alessio Lomuscio, Artur Niewia...
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 9 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
IJKL
2008
116views more  IJKL 2008»
13 years 9 months ago
Assessing the enterprise's knowledge management maturity level
: Knowledge is not manageable, as if it were data or information. Consequently, Knowledge Management (KM) must address activities that utilise and create knowledge, instead of addr...
Michel Grundstein
FAC
2006
104views more  FAC 2006»
13 years 9 months ago
Angelic nondeterminism in the unifying theories of programming
Hoare and He's unifying theories of programming (UTP) is a model of alphabetised relations expressed as predicates; it supports development in several programming paradigms. T...
Ana Cavalcanti, Jim Woodcock, Steve Dunne
IJCV
2008
241views more  IJCV 2008»
13 years 9 months ago
Object Class Recognition and Localization Using Sparse Features with Limited Receptive Fields
We investigate the role of sparsity and localized features in a biologically-inspired model of visual object classification. As in the model of Serre, Wolf, and Poggio, we first a...
Jim Mutch, David G. Lowe
ENVSOFT
2006
104views more  ENVSOFT 2006»
13 years 9 months ago
Landscape analysis and simulation shell (Lass)
We present a set of models for simulating vegetation dynamics in disturbance-prone ecosystems with different complexity levels, integrated in a modelling environment for generatin...
Juli G. Pausas, Juan I. Ramos