Sciweavers

1888 search results - page 66 / 378
» Proof theory and computational analysis
Sort
View
105
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 7 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
85
Voted
AAMAS
2007
Springer
15 years 6 months ago
Using Evolutionary Game-Theory to Analyse the Performance of Trading Strategies in a Continuous Double Auction Market
Abstract. In agent-based computational economics, many different trading strategies have been proposed. Given the kinds of market that such trading strategies are employed in, it i...
Kai Cai, Jinzhong Niu, Simon Parsons
75
Voted
COLING
2010
14 years 7 months ago
Expressing OWL axioms by English sentences: dubious in theory, feasible in practice
With OWL (Web Ontology Language) established as a standard for encoding ontologies on the Semantic Web, interest has begun to focus on the task of verbalising OWL code in controll...
Richard Power, Allan Third
COMPGEOM
2011
ACM
14 years 4 months ago
Persistence-based clustering in riemannian manifolds
We present a clustering scheme that combines a mode-seeking phase with a cluster merging phase in the corresponding density map. While mode detection is done by a standard graph-b...
Frédéric Chazal, Leonidas J. Guibas,...
88
Voted
DAGSTUHL
2000
15 years 1 months ago
Similarity Measure Computation of Convex Polyhedra Revisited
We study the computation of rotation-invariant similarity measures of convex polyhedra, based on Minkowski's theory of mixed volumes. To compute the similarity measure, a (mix...
Jos B. T. M. Roerdink, Henk Bekker