Sciweavers

1653 search results - page 128 / 331
» Directed tree-width examples
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 1 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
109
Voted
CORR
2010
Springer
98views Education» more  CORR 2010»
15 years 1 months ago
Multi-sensorial interaction with a nano-scale phenomenon : the force curve
Abstract. Using Atomic Force Microscopes (AFM) to manipulate nanoobjects is an actual challenge for surface scientists. Basic haptic interfaces between the AFM and experimentalists...
Sylvain Marlière, Daniela Urma, Jean-Loup F...
132
Voted
CONSTRAINTS
2008
132views more  CONSTRAINTS 2008»
15 years 1 months ago
Essence : A constraint language for specifying combinatorial problems
Abstract. Essence is a formal language for specifying combinatorial problems, in a manner similar to natural rigorous specifications that use a mixture of natural language and disc...
Alan M. Frisch, Warwick Harvey, Christopher Jeffer...
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 1 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
CORR
2008
Springer
75views Education» more  CORR 2008»
15 years 1 months ago
A new probabilistic transformation of belief mass assignment
In this paper, we propose in Dezert-Smarandache Theory (DSmT) framework, a new probabilistic transformation, called DSmP, in order to build a subjective probability measure from an...
Jean Dezert, Florentin Smarandache