Sciweavers

2722 search results - page 346 / 545
» The Model Evolution Calculus
Sort
View
148
Voted
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
15 years 8 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CORR
2004
Springer
120views Education» more  CORR 2004»
15 years 3 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
140
Voted
SIAMNUM
2011
154views more  SIAMNUM 2011»
14 years 10 months ago
Continuous Mesh Framework Part I: Well-Posed Continuous Interpolation Error
In the context of mesh adaptation, Riemannian metric spaces have been used to prescribe orientation, density and stretching of anisotropic meshes. But, such structures are only con...
Adrien Loseille, Frédéric Alauzet
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 8 months ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
ACSC
2004
IEEE
15 years 7 months ago
On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma
Table 1 shows the payoff to player one. The same matrix also holds for player two. Player one can gain the maximum 5 points (T = 5) by defection if player two cooperates. However,...
Daniel Jang, Peter A. Whigham, Grant Dick