Sciweavers

244 search results - page 44 / 49
» Modeling Instrumental Conditioning - The Behavioral Regulati...
Sort
View
PADL
2001
Springer
15 years 2 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
ECAI
2008
Springer
14 years 11 months ago
Intelligent adaptive monitoring for cardiac surveillance
Monitoring patients in intensive care units is a critical task. Simple condition detection is generally insufficient to diagnose a patient and may generate many false alarms to the...
Lucie Callens, Guy Carrault, Marie-Odile Cordier, ...
SIGECOM
2008
ACM
90views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Non-myopic strategies in prediction markets
One attractive feature of market scoring rules [Hanson '03] is that they are myopically strategyproof: It is optimal for a trader to report her true belief about the likeliho...
Stanko Dimitrov, Rahul Sami
MICCAI
2004
Springer
15 years 10 months ago
3D Bayesian Regularization of Diffusion Tensor MRI Using Multivariate Gaussian Markov Random Fields
3D Bayesian regularization applied to diffusion tensor MRI is presented here. The approach uses Markov Random Field ideas and is based upon the definition of a 3D neighborhood syst...
Marcos Martín-Fernández, Carl-Fredri...
ISSTA
2009
ACM
15 years 4 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan