Sciweavers

1063 search results - page 139 / 213
» Order and Negation as Failure
Sort
View
IANDC
2008
128views more  IANDC 2008»
15 years 1 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
82
Voted
CORR
2006
Springer
74views Education» more  CORR 2006»
15 years 1 months ago
PAC Classification based on PAC Estimates of Label Class Distributions
A standard approach in pattern classification is to estimate the distributions of the label classes, and then to apply the Bayes classifier to the estimates of the distributions in...
Nick Palmer, Paul W. Goldberg
ESWA
2006
161views more  ESWA 2006»
15 years 29 days ago
Automated trend analysis of proteomics data using an intelligent data mining architecture
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalle...
James Malone, Kenneth McGarry, Chris Bowerman
CORR
2007
Springer
116views Education» more  CORR 2007»
15 years 28 days ago
A presentation of Quantum Logic based on an "and then" connective
When a physicist performs a quantic measurement, new information about the system at hand is gathered. This presentation studies the logical properties of how this new information...
Daniel Lehmann
JSAC
2006
137views more  JSAC 2006»
15 years 27 days ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...