Sciweavers

2351 search results - page 47 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
WSC
1997
14 years 11 months ago
Computational Efficiency Evaluation in Output Analysis
A central quantity in steady-state simulation is the time-average variance constant. Estimates of this quantity are needed (for example) for constructing confidence intervals, an...
Halim Damerdji, Shane G. Henderson, Peter W. Glynn
WWW
2009
ACM
15 years 10 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
JAIR
2010
131views more  JAIR 2010»
14 years 8 months ago
Automatic Induction of Bellman-Error Features for Probabilistic Planning
Domain-specific features are important in representing problem structure throughout machine learning and decision-theoretic planning. In planning, once state features are provide...
Jia-Hong Wu, Robert Givan
CPHYSICS
2007
84views more  CPHYSICS 2007»
14 years 9 months ago
Simulating botulinum neurotoxin with constant pH molecular dynamics in Generalized Born implicit solvent
A new method was proposed by Mongan et al for constant pH molecular dynamics simulation and was implemented in AMBER 8 package. Protonation states are modeled with different char...
Yongzhi Chen, Xin Chen, Yuefan Deng