Sciweavers

3786 search results - page 493 / 758
» Structure Comparison and Structure Patterns
Sort
View
98
Voted
HAIS
2009
Springer
15 years 8 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
ER
2001
Springer
131views Database» more  ER 2001»
15 years 8 months ago
Seamless Personalization of E-commerce Applications
In this paper we present an original approach for personalizing complex Web applications, in particular e-commerce applications. This approach is based on a clear separation of con...
Juan Cappi, Gustavo Rossi, Andres Fortier, Daniel ...
123
Voted
JSAI
2001
Springer
15 years 8 months ago
Complexity of Agents and Complexity of Markets
In this study we rethought efficient market hypothesis from a viewpoint of complexity of market participants’ prediction methods and market price’s dynamics, and examined the ...
Kiyoshi Izumi
127
Voted
ICCAD
1999
IEEE
77views Hardware» more  ICCAD 1999»
15 years 8 months ago
Symbolic functional and timing verification of transistor-level circuits
We introduce a new method of verifying the timing of custom CMOS circuits. Due to the exponential number of patterns required, traditional simulation methods are unable to exhaust...
Clayton B. McDonald, Randal E. Bryant
GW
1999
Springer
194views Biometrics» more  GW 1999»
15 years 8 months ago
Communicative Rhythm in Gesture and Speech
Led by the fundamental role that rhythms apparently play in speech and gestural communication among humans, this study was undertaken to substantiate a biologically motivated model...
Ipke Wachsmuth