Sciweavers

3013 search results - page 542 / 603
» Context-Oriented Domain Analysis
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
14 years 10 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
ICSE
2009
IEEE-ACM
14 years 10 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
ICST
2009
IEEE
14 years 10 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
110
Voted
ICWSM
2009
14 years 10 months ago
Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a tr...
Victoria L. Rubin
100
Voted
CJ
2010
131views more  CJ 2010»
14 years 10 months ago
Turning Back Time - What Impact on Performance?
Consistent with the divide-and-conquer approach to problem solving, a recursive result is presented in the domain of stochastic modelling that derives product-form solutions for t...
Peter G. Harrison