Sciweavers

3778 search results - page 112 / 756
» Erdos-Ko-Rado for three sets
Sort
View
136
Voted
IFIP
2005
Springer
15 years 9 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
ICTAI
2002
IEEE
15 years 9 months ago
Machine Learning for Software Engineering: Case Studies in Software Reuse
There are many machine learning algorithms currently available. In the 21st century, the problem no longer lies in writing the learner, but in choosing which learners to run on a ...
Justin S. Di Stefano, Tim Menzies
ICALP
2001
Springer
15 years 8 months ago
Approximation Algorithms for Partial Covering Problems
We study the generalization of covering problems to partial covering. Here we wish to cover only a desired number of elements, rather than covering all elements as in standard cov...
Rajiv Gandhi, Samir Khuller, Aravind Srinivasan
RE
2001
Springer
15 years 8 months ago
An Empirical Study of Facilitation of Computer-Mediated Distributed Requirements Negotiations
Group facilitation is an important element of group approaches to Requirements Engineering (RE). The facilitation in ‘traditional’ face-to-face groups is challenged by the inc...
Daniela E. Damian, Mildred L. G. Shaw, Armin Eberl...
EH
1999
IEEE
179views Hardware» more  EH 1999»
15 years 8 months ago
Artificial Evolution of Active Filters: A Case Study
This article focuses on the application of artificial evolution to the synthesis of analog active filters. The main objective of this research is the achievement of a new class of...
Ricardo Salem Zebulum, Marco Aurélio Cavalc...