Sciweavers

9931 search results - page 1726 / 1987
» Generative Modeling by PRISM
Sort
View
ICFEM
2007
Springer
15 years 8 months ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 8 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ACSAC
2004
IEEE
15 years 8 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
APSEC
2004
IEEE
15 years 8 months ago
A Systematic Method to Instantiate Core Assets in Product Line Engineering
Product line engineering (PLE) is one of the recent and effective reuse approaches, and it consists of two processes; framework engineering and application engineering. Framework ...
Soo Dong Kim, Soo Ho Chang, Chee Won Chang
AIRS
2006
Springer
15 years 8 months ago
A Novel Ant-Based Clustering Approach for Document Clustering
Recently, much research has been proposed using nature inspired algorithms to perform complex machine learning tasks. Ant Colony Optimization (ACO) is one such algorithm based on s...
Yulan He, Siu Cheung Hui, Yongxiang Sim
« Prev « First page 1726 / 1987 Last » Next »