Sciweavers

4052 search results - page 104 / 811
» Using RDF to describe networks
Sort
View
107
Voted
IAT
2007
IEEE
15 years 7 months ago
Analysis of Multi-Actor Policy Contexts Using Perception Graphs
Policy making is a multi-actor process: it involves a variety of actors, each trying to further their own interests. How these actors decide and act largely depends on the way the...
Pieter W. G. Bots
DSN
2008
IEEE
15 years 2 months ago
Using an assurance case to support independent assessment of the transition to a new GPS ground control system
We describe a specific application of assurance cases to the problem of ensuring that a transition from a legacy system to its replacement will not compromise mission assurance ob...
Elisabeth A. Nguyen, William S. Greenwell, Myron H...
IJIT
2004
15 years 2 months ago
Improving the Convergence of the Backpropagation Algorithm Using Local Adaptive Techniques
Since the presentation of the backpropagation algorithm, a vast variety of improvements of the technique for training a feed forward neural networks have been proposed. This articl...
Z. Zainuddin, N. Mahat, Y. Abu Hassan
127
Voted
RAID
2010
Springer
14 years 11 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
147
Voted
CIA
2003
Springer
15 years 6 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler