Sciweavers

172 search results - page 24 / 35
» How to Specialize by Theory Refinement
Sort
View
ITNG
2008
IEEE
15 years 4 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
85
Voted
BIRTHDAY
2010
Springer
14 years 9 months ago
The Edge of Graph Transformation - Graphs for Behavioural Specification
The title of this paper, besides being a pun, can be taken to mean either the frontier of research in graph transformation, or the advantage of using graph transformation. To focus...
Arend Rensink
BMCBI
2008
152views more  BMCBI 2008»
14 years 9 months ago
Predicting biological system objectives de novo from internal state measurements
Background: Optimization theory has been applied to complex biological systems to interrogate network properties and develop and refine metabolic engineering strategies. For examp...
Erwin P. Gianchandani, Matthew A. Oberhardt, Antho...
SERA
2007
Springer
15 years 3 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
IAT
2006
IEEE
15 years 3 months ago
Realising Common Knowledge Assumptions in Agent Auctions
Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are commo...
Frank Guerin, Emmanuel M. Tadjouddine