Sciweavers

2006 search results - page 157 / 402
» Heuristic Security-Testing Methods
Sort
View
AAAI
2000
15 years 2 months ago
Multivariate Clustering by Dynamics
We present a Bayesian clustering algorithm for multivariate time series. A clustering is regarded as a probabilistic model in which the unknown auto-correlation structure of a tim...
Marco Ramoni, Paola Sebastiani, Paul R. Cohen
95
Voted
WSC
1997
15 years 2 months ago
Taking the Work Out of Simulation Modeling: An Application of Technology Integration
This paper presents an implementation methodology appropriate for providing a broad range of proven, classical Operations Research methods and techniques to the simulation modeler...
Gregory S. Baker
101
Voted
AAAI
1990
15 years 2 months ago
A Design Based Approach to Constructing Computational Solutions to Diagnostic Problems
Troubleshooting problems in real manufacturing environments impose constraints on admissible solutions that make the computational solutions offered by "troubleshooting from ...
D. Volovik, Imran A. Zualkernan, Paul E. Johnson, ...
93
Voted
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 27 days ago
alphaCertified: certifying solutions to polynomial systems
Smale's -theory uses estimates related to the convergence of Newton's method to give criteria implying that Newton iterations will converge quadratically to solutions to ...
Jonathan D. Hauenstein, Frank Sottile
85
Voted
ALIFE
2005
15 years 22 days ago
New Robotics: Design Principles for Intelligent Systems
New Robotics designates an approach to robotics that, in contrast to traditional robotics, employs ideas and principles from biology. While in the traditional approach there are g...
Rolf Pfeifer, Fumiya Iida, Josh C. Bongard