Sciweavers

DSS
2006
75views more  DSS 2006»
13 years 11 months ago
Model alignment of anthrax attack simulations
This paper describes our experience aligning two simulation models of disease progression after biological attacks. The first model is the Incubation-Prodromal-Fulminant (IPF) mod...
Li-Chiou Chen, Kathleen M. Carley, Douglas B. Frid...
CVIU
2006
107views more  CVIU 2006»
13 years 11 months ago
Testing new variants of the Beckmann-Kirchhoff model against radiance data
In this paper, we explore whether the Fresnel term can be used to improve the predictions of the Beckmann
Hossein Ragheb, Edwin R. Hancock
CSDA
2006
102views more  CSDA 2006»
13 years 11 months ago
An improved Akaike information criterion for state-space model selection
Following the work of Hurvich, Shumway, and Tsai (1990), we propose an "improved" variant of the Akaike information criterion, AICi, for state-space model selection. The...
Thomas Bengtsson, Joseph E. Cavanaugh
CSDA
2006
84views more  CSDA 2006»
13 years 11 months ago
Extremal financial risk models and portfolio evaluation
It is difficult to find an existing single model which is able to simultaneously model exceedances over thresholds in multivariate financial time series. A new modeling approach, ...
Zhengjun Zhang, James Huang
CORR
2006
Springer
123views Education» more  CORR 2006»
13 years 11 months ago
Context for models of concurrency
Many categories have been used to model concurrency. Using any of these, the challenge is to reduce a given model to a smaller representation which nevertheless preserves the relev...
Peter Bubenik
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 11 months ago
The computational power of population protocols
We consider the model of population protocols introduced by Angluin et al. [AAD+ 04], in which anonymous finite-state agents stably compute a predicate of the multiset of their in...
Dana Angluin, James Aspnes, David Eisenstat, Eric ...
CORR
2006
Springer
137views Education» more  CORR 2006»
13 years 11 months ago
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
In this paper we resolve an open problem regarding resettable zero knowledge in the bare public-key (BPK for short) model: Does there exist constant round resettable zero knowledg...
Yi Deng, Dongdai Lin
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 11 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
CORR
2006
Springer
109views Education» more  CORR 2006»
13 years 11 months ago
Decision Making with Side Information and Unbounded Loss Functions
We consider the problem of decision-making with side information and unbounded loss functions. Inspired by probably approximately correct learning model, we use a slightly differe...
Majid Fozunbal, Ton Kalker
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 11 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin