Sciweavers

3555 search results - page 131 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
AUSAI
2006
Springer
15 years 5 months ago
Robust Character Recognition Using a Hierarchical Bayesian Network
There is increasing evidence to suggest that the neocortex of the mammalian brain does not consist of a collection of specialised and dedicated cortical architectures, but instead ...
John Thornton, Torbjorn Gustafsson, Michael Blumen...
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 6 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
15 years 2 days ago
Satisfaction Meets Expectations - Computing Expected Values of Probabilistic Hybrid Systems with SMT
Stochastic satisfiability modulo theories (SSMT), which is an extension of satisfiability modulo theories with randomized quantification, has successfully been used as a symboli...
Martin Fränzle, Tino Teige, Andreas Eggers
FS
2006
123views more  FS 2006»
15 years 1 months ago
American Parisian options
Using the solution of the one-sided exit problem, a procedure to price Parisian barrier options in a jump-diffusion model with two-sided exponential jumps is developed. By extendin...
Marc Chesney, Laurent Gauthier
TSMC
2010
14 years 8 months ago
An Object-Process-Based Modeling Language for Multiagent Systems
Abstract--While a number of modeling languages for constructing multiagent systems (MASs) have been suggested, none of them is widely accepted and used. A prominent reason for this...
Arnon Sturm, Dov Dori, Onn Shehory