Sciweavers

9405 search results - page 308 / 1881
» Computing a Model of Set Theory
Sort
View
EMS
2008
IEEE
15 years 6 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
141
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 5 months ago
Mathematical Foundations for a Compositional Distributional Model of Meaning
We propose a mathematical framework for a unification of the distributional theory of meaning in terms of vector space models, and a compositional theory for grammatical types, fo...
Bob Coecke, Mehrnoosh Sadrzadeh, Stephen Clark
PLILP
1993
Springer
15 years 9 months ago
Narrowing Approximations as an Optimization for Equational Logic Programs
Abstract. Solving equations in equational theories is a relevant programming paradigm which integrates logic and equational programming into one unified framework. Efficient metho...
María Alpuente, Moreno Falaschi, Marí...
SDM
2008
SIAM
138views Data Mining» more  SDM 2008»
15 years 6 months ago
Clustering from Constraint Graphs
In constrained clustering it is common to model the pairwise constraints as edges on the graph of observations. Using results from graph theory, we analyze such constraint graphs ...
Ari Freund, Dan Pelleg, Yossi Richter
DISOPT
2008
99views more  DISOPT 2008»
15 years 5 months ago
Computing robust basestock levels
This paper considers how to optimally set the basestock level for a single buffer when demand is uncertain, in a robust framework. We present a family of algorithms based on decom...
Daniel Bienstock, Nuri Özbay