Sciweavers

5525 search results - page 950 / 1105
» Verification of Model Transformations
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
15 years 3 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
AI
2000
Springer
15 years 3 months ago
Credal networks
Credal networks are models that extend Bayesian nets to deal with imprecision in probability, and can actually be regarded as sets of Bayesian nets. Evidence suggests that credal ...
Fabio Gagliardi Cozman
NECO
1998
171views more  NECO 1998»
15 years 3 months ago
Constrained Optimization for Neural Map Formation: A Unifying Framework for Weight Growth and Normalization
three different levels of abstraction: detailed models including ctivity dynamics, weight dynamics that abstract from the neural activity dynamics by an adiabatic approximation, an...
Laurenz Wiskott, Terrence J. Sejnowski
PR
2002
108views more  PR 2002»
15 years 3 months ago
Hyperparameter estimation for satellite image restoration using a MCMC maximum-likelihood method
The satellite image deconvolution problem is ill-posed and must be regularized. Herein, we use an edge-preserving regularization model using a ' function, involving two hyper...
André Jalobeanu, Laure Blanc-Féraud,...
RML
2002
140views Business» more  RML 2002»
15 years 3 months ago
UML as knowledge acquisition frontend for Semantic Web configuration knowledge bases
The trend towards highly specialized solution providers cooperatively offering configurable products and services to their customers requires the extension of current (standalone)...
Alexander Felfernig, Gerhard Friedrich, Dietmar Ja...