Sciweavers

3971 search results - page 725 / 795
» On the Use of Properties in Java Applications
Sort
View
ESOP
2008
Springer
15 years 6 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
CIDR
2003
164views Algorithms» more  CIDR 2003»
15 years 5 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
IJCAI
2001
15 years 5 months ago
Reinforcement Learning in Distributed Domains: Beyond Team Games
Using a distributed algorithm rather than a centralized one can be extremely beneficial in large search problems. In addition, the incorporation of machine learning techniques lik...
David Wolpert, Joseph Sill, Kagan Tumer
PICS
2003
15 years 5 months ago
Continuous Tone Alternatives To Halftone Through Historical Reflection
Halftone printing has been developing in a linear manner since the inception of photography. The process of refinement has taken it from one level to another producing increasingl...
Andrew Atkinson
BMCBI
2008
144views more  BMCBI 2008»
15 years 4 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath