Sciweavers

15033 search results - page 222 / 3007
» Complexity Theory and Algorithms
Sort
View
IWIA
2006
IEEE
15 years 10 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
HASKELL
2005
ACM
15 years 10 months ago
Verifying haskell programs using constructive type theory
Proof assistants based on dependent type theory are closely related to functional programming languages, and so it is tempting to use them to prove the correctness of functional p...
Andreas Abel, Marcin Benke, Ana Bove, John Hughes,...
ANNPR
2006
Springer
15 years 8 months ago
Hierarchical Neural Networks Utilising Dempster-Shafer Evidence Theory
Abstract. Hierarchical neural networks show many benefits when employed for classification problems even when only simple methods analogous to decision trees are used to retrieve t...
Rebecca Fay, Friedhelm Schwenker, Christian Thiel,...
ECIS
2004
15 years 6 months ago
Extending media richness theory: the influence of a shared social construction
Globalization has seen the emergence of virtual teams solving complex organisational problems using computer-mediated technologies. By extending Media Richness Theory, it was the ...
Irem Sevinc, John D'Ambra
131
Voted
WCE
2007
15 years 5 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...