Sciweavers

1737 search results - page 297 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
JIKM
2008
98views more  JIKM 2008»
14 years 11 months ago
Knowledge-Based Expert System Development and Validation with Petri Nets
Expert systems (ESs) are complex information systems that are expensive to build and difficult to validate. Numerous knowledge representation strategies such as rules, semantic net...
Madjid Tavana
ECAI
2006
Springer
15 years 3 months ago
Cheating Is Not Playing: Methodological Issues of Computational Game Theory
Abstract. Computational Game Theory is a way to study and evaluate behaviors using game theory models, via agent-based computer simulations. One of the most known example of this a...
Bruno Beaufils, Philippe Mathieu
ECCB
2005
IEEE
15 years 5 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser
UAI
2008
15 years 1 months ago
Projected Subgradient Methods for Learning Sparse Gaussians
Gaussian Markov random fields (GMRFs) are useful in a broad range of applications. In this paper we tackle the problem of learning a sparse GMRF in a high-dimensional space. Our a...
John Duchi, Stephen Gould, Daphne Koller
COMCOM
1998
78views more  COMCOM 1998»
14 years 11 months ago
The performance of SQL queries to an X.500 directory system
The X.500 standard speci es a distributed directory service designed to store information about people and objects associated with computer networks. Its API is geared toward retr...
David Barrowman, Patrick Martin