Sciweavers

1486 search results - page 168 / 298
» Firewall Rules Analysis
Sort
View
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
15 years 8 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
MICAI
2000
Springer
15 years 8 months ago
Searching for a Solution to Program Verification=Equation Solving in CCS
Unique Fixpoint Induction, UFI, is a chief inference rule to prove the equivalence of recursive processes in CCS [7]. It plays a major role in the equational approach to verificati...
Raul Monroy, Alan Bundy, Ian Green
AAAI
2006
15 years 5 months ago
Computing Slater Rankings Using Similarities among Candidates
Voting (or rank aggregation) is a general method for aggregating the preferences of multiple agents. One important voting rule is the Slater rule. It selects a ranking of the alte...
Vincent Conitzer
BMCBI
2006
116views more  BMCBI 2006»
15 years 4 months ago
Gene annotation and network inference by phylogenetic profiling
Background: Phylogenetic analysis is emerging as one of the most informative computational methods for the annotation of genes and identification of evolutionary modules of functi...
Jie Wu, Zhenjun Hu, Charles DeLisi
BMCBI
2006
127views more  BMCBI 2006»
15 years 4 months ago
Using local gene expression similarities to discover regulatory binding site modules
Background: We present an approach designed to identify gene regulation patterns using sequence and expression data collected for Saccharomyces cerevisae. Our main goal is to rela...
Bartek Wilczynski, Torgeir R. Hvidsten, Andriy Kry...