Sciweavers

5456 search results - page 872 / 1092
» A study of Object Evolution
Sort
View
139
Voted
CCS
2007
ACM
15 years 11 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
COCO
2007
Springer
75views Algorithms» more  COCO 2007»
15 years 11 months ago
On the Theory of Matchgate Computations
Valiant has proposed a new theory of algorithmic computation based on perfect matchings and Pfaffians. We study the properties of matchgates—the basic building blocks in this n...
Jin-yi Cai, Vinay Choudhary, Pinyan Lu
ECML
2007
Springer
15 years 11 months ago
Decision Tree Instability and Active Learning
Decision tree learning algorithms produce accurate models that can be interpreted by domain experts. However, these algorithms are known to be unstable – they can produce drastic...
Kenneth Dwyer, Robert Holte
ECTEL
2007
Springer
15 years 11 months ago
Model Driven E-Learning Platform Integration
The success of the e-learning paradigm observed in recent times created a growing demand for e-learning systems in universities and other educational institutions, that itself led ...
Zuzana Bizonova
EMMCVPR
2007
Springer
15 years 11 months ago
3D Computation of Gray Level Co-occurrence in Hyperspectral Image Cubes
This study extended the computation of GLCM (gray level co-occurrence matrix) to a three-dimensional form. The objective was to treat hyperspectral image cubes as volumetric data s...
Fuan Tsai, Chun-Kai Chang, Jian-Yeo Rau, Tang-Huan...