Sciweavers

1362 search results - page 272 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
WS
2008
ACM
13 years 5 months ago
ActiveRDF: Embedding Semantic Web data into object-oriented languages
Semantic Web applications share a large portion of development effort with database-driven Web applications. Existing approaches for development of these database-driven applicati...
Eyal Oren, Benjamin Heitmann, Stefan Decker
NECO
2011
13 years 21 days ago
Least Squares Estimation Without Priors or Supervision
Selection of an optimal estimator typically relies on either supervised training samples (pairs of measurements and their associated true values), or a prior probability model for...
Martin Raphan, Eero P. Simoncelli
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
13 years 11 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
SAC
2010
ACM
14 years 18 days ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
PPSN
2000
Springer
13 years 9 months ago
Optimizing through Co-evolutionary Avalanches
Abstract. We explore a new general-purpose heuristic for nding highquality solutions to hard optimization problems. The method, called extremal optimization, is inspired by self-or...
Stefan Boettcher, Allon G. Percus, Michelangelo Gr...