Sciweavers

8669 search results - page 1563 / 1734
» Computing matrix representations
Sort
View
91
Voted
AAAI
2008
15 years 4 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
121
Voted
AVI
2008
15 years 4 months ago
VCode and VData: illustrating a new framework for supporting the video annotation workflow
Digital tools for annotation of video have the promise to provide immense value to researchers in disciplines ranging from psychology to ethnography to computer science. With trad...
Joey Hagedorn, Joshua M. Hailpern, Karrie Karahali...
116
Voted
WSC
2007
15 years 4 months ago
A hybrid epidemic model: combining the advantages of agent-based and equation-based approaches
Agent-based models (ABMs) are powerful in describing structured epidemiological processes involving human behavior and local interaction. The joint behavior of the agents can be v...
Georgiy V. Bobashev, D. Michael Goedecke, Feng Yu,...
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 3 months ago
Modular construction of finite and complete prefixes of Petri net unfoldings
This paper considers distributed systems, defined as a collection of components interacting through interfaces. Components, interfaces and distributed systems are modeled as Petri...
Agnes Madalinski, Eric Fabre
ASIACRYPT
2008
Springer
15 years 3 months ago
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Abstract. The generic (aka. black-box) group model is a valuable methodology for analyzing the computational hardness of number-theoretic problems used in cryptography. Since the p...
Andy Rupp, Gregor Leander, Endre Bangerter, Alexan...
« Prev « First page 1563 / 1734 Last » Next »