Sciweavers

10995 search results - page 2024 / 2199
» Positioning
Sort
View
EKAW
2008
Springer
15 years 7 months ago
Principles for Knowledge Engineering on the Web
With the advent of the Web and the efforts towards a Semantic Web the nature of knowledge engineering has changed drastically. In this position paper we propose four principles fo...
Guus Schreiber
ESEM
2008
ACM
15 years 7 months ago
Evaluation of capture-recapture models for estimating the abundance of naturally-occurring defects
Project managers can use capture-recapture models to manage the inspection process by estimating the number of defects present in an artifact and determining whether a reinspectio...
Gursimran Singh Walia, Jeffrey C. Carver
ALT
2010
Springer
15 years 6 months ago
Contrast Pattern Mining and Its Application for Building Robust Classifiers
: The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Such ability can assist domain experts to understand their d...
Kotagiri Ramamohanarao
IMC
2007
ACM
15 years 6 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
APPROX
2010
Springer
207views Algorithms» more  APPROX 2010»
15 years 6 months ago
Exploiting Concavity in Bimatrix Games: New Polynomially Tractable Subclasses
Abstract. We study the fundamental problem of computing an arbitrary Nash equilibrium in bimatrix games. We start by proposing a novel characterization of the set of Nash equilibri...
Spyros C. Kontogiannis, Paul G. Spirakis
« Prev « First page 2024 / 2199 Last » Next »