Sciweavers

1985 search results - page 328 / 397
» Multiresolution Analysis of Connectivity
Sort
View
129
Voted
CN
2006
117views more  CN 2006»
15 years 2 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
130
Voted
CORR
2006
Springer
95views Education» more  CORR 2006»
15 years 2 months ago
SAT Solving for Argument Filterings
Abstract. This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for term...
Michael Codish, Peter Schneider-Kamp, Vitaly Lagoo...
129
Voted
ESWA
2006
154views more  ESWA 2006»
15 years 2 months ago
Artificial neural networks with evolutionary instance selection for financial forecasting
In this paper, I propose a genetic algorithm (GA) approach to instance selection in artificial neural networks (ANNs) for financial data mining. ANN has preeminent learning abilit...
Kyoung-jae Kim
111
Voted
IANDC
2006
97views more  IANDC 2006»
15 years 2 months ago
Pure bigraphs: Structure and dynamics
Abstract Bigraphs are graphs whose nodes may be nested, representing locality, independently of the edges connecting them. They may be equipped with reaction rules, forming a bigra...
Robin Milner
112
Voted
CORR
2007
Springer
88views Education» more  CORR 2007»
15 years 2 months ago
Target assignment for robotic networks: asymptotic performance under limited communication
— We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of...
Stephen L. Smith, Francesco Bullo