Sciweavers

244 search results - page 44 / 49
» Modeling Instrumental Conditioning - The Behavioral Regulati...
Sort
View
PADL
2001
Springer
15 years 5 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
116
Voted
ECAI
2008
Springer
15 years 2 months ago
Intelligent adaptive monitoring for cardiac surveillance
Monitoring patients in intensive care units is a critical task. Simple condition detection is generally insufficient to diagnose a patient and may generate many false alarms to the...
Lucie Callens, Guy Carrault, Marie-Odile Cordier, ...
90
Voted
SIGECOM
2008
ACM
90views ECommerce» more  SIGECOM 2008»
15 years 15 days ago
Non-myopic strategies in prediction markets
One attractive feature of market scoring rules [Hanson '03] is that they are myopically strategyproof: It is optimal for a trader to report her true belief about the likeliho...
Stanko Dimitrov, Rahul Sami
MICCAI
2004
Springer
16 years 1 months ago
3D Bayesian Regularization of Diffusion Tensor MRI Using Multivariate Gaussian Markov Random Fields
3D Bayesian regularization applied to diffusion tensor MRI is presented here. The approach uses Markov Random Field ideas and is based upon the definition of a 3D neighborhood syst...
Marcos Martín-Fernández, Carl-Fredri...
95
Voted
ISSTA
2009
ACM
15 years 7 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan