Sciweavers

1985 search results - page 328 / 397
» Multiresolution Analysis of Connectivity
Sort
View
92
Voted
CN
2006
117views more  CN 2006»
14 years 11 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
CORR
2006
Springer
95views Education» more  CORR 2006»
14 years 11 months ago
SAT Solving for Argument Filterings
Abstract. This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for term...
Michael Codish, Peter Schneider-Kamp, Vitaly Lagoo...
ESWA
2006
154views more  ESWA 2006»
14 years 11 months ago
Artificial neural networks with evolutionary instance selection for financial forecasting
In this paper, I propose a genetic algorithm (GA) approach to instance selection in artificial neural networks (ANNs) for financial data mining. ANN has preeminent learning abilit...
Kyoung-jae Kim
IANDC
2006
97views more  IANDC 2006»
14 years 11 months ago
Pure bigraphs: Structure and dynamics
Abstract Bigraphs are graphs whose nodes may be nested, representing locality, independently of the edges connecting them. They may be equipped with reaction rules, forming a bigra...
Robin Milner
CORR
2007
Springer
88views Education» more  CORR 2007»
14 years 11 months ago
Target assignment for robotic networks: asymptotic performance under limited communication
— We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of...
Stephen L. Smith, Francesco Bullo