Sciweavers

3679 search results - page 657 / 736
» Answer set based design of knowledge systems
Sort
View
158
Voted
SIAMSC
2008
148views more  SIAMSC 2008»
15 years 3 months ago
Multilevel Adaptive Aggregation for Markov Chains, with Application to Web Ranking
A multilevel adaptive aggregation method for calculating the stationary probability vector of an irreducible stochastic matrix is described. The method is a special case of the ada...
Hans De Sterck, Thomas A. Manteuffel, Stephen F. M...
183
Voted
USS
2010
15 years 1 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
128
Voted
ATAL
2009
Springer
15 years 10 months ago
Emergent service provisioning and demand estimation through self-organizing agent communities
A major challenge within open markets is the ability to satisfy service demand with an adequate supply of service providers, especially when such demand may be volatile due to cha...
Mariusz Jacyno, Seth Bullock, Michael Luck, Terry ...
125
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
137
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 7 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...