Sciweavers

160 search results - page 31 / 32
» The Conversion of Diagrams to Knowledge Bases
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
COMPGEOM
2008
ACM
13 years 7 months ago
Robust construction of the three-dimensional flow complex
The Delaunay triangulation and its dual the Voronoi diagram are ubiquitous geometric complexes. From a topological standpoint, the connection has recently been made between these ...
Frédéric Cazals, Aditya G. Parameswa...
AAAI
2006
13 years 7 months ago
A BDD-Based Polytime Algorithm for Cost-Bounded Interactive Configuration
Interactive configurators are decision support systems assisting users in selecting values for parameters that respect given constraints. The underlying knowledge can be convenien...
Tarik Hadzic, Henrik Reif Andersen
JISE
2008
77views more  JISE 2008»
13 years 5 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
BMCBI
2010
76views more  BMCBI 2010»
13 years 5 months ago
Validation and characterization of DNA microarray gene expression data distribution and associated moments
Background: The data from DNA microarrays are increasingly being used in order to understand effects of different conditions, exposures or diseases on the modulation of the expres...
Reuben Thomas, Luis de la Torre, Xiaoqing Chang, S...