Sciweavers

61 search results - page 12 / 13
» Exploiting Partial Operand Knowledge
Sort
View
ESAW
2004
Springer
13 years 10 months ago
Techniques for Analysis and Calibration of Multi-agent Simulations
In this paper we present analysis and calibration techniques that exploit knowledge about a multi agent society in order to calibrate the system parameters of a corresponding socie...
Manuel Fehler, Franziska Klügl, Frank Puppe
SEMWEB
2001
Springer
13 years 9 months ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
AVI
2006
13 years 6 months ago
Enabling interaction with single user applications through speech and gestures on a multi-user tabletop
Co-located collaborators often work over physical tabletops with rich geospatial information. Previous research shows that people use gestures and speech as they interact with art...
Edward Tse, Chia Shen, Saul Greenberg, Clifton For...
BMCBI
2008
138views more  BMCBI 2008»
13 years 5 months ago
Inference of haplotypic phase and missing genotypes in polyploid organisms and variable copy number genomic regions
Background: The power of haplotype-based methods for association studies, identification of regions under selection, and ancestral inference, is well-established for diploid organ...
Shu-Yi Su, Jonathan White, David J. Balding, Lachl...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 5 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...