Sciweavers

71 search results - page 3 / 15
» What Ants Cannot Do
Sort
View
ECSA
2010
Springer
13 years 6 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
BIOINFORMATICS
2006
92views more  BIOINFORMATICS 2006»
13 years 6 months ago
What should be expected from feature selection in small-sample settings
Motivation: High-throughput technologies for rapid measurement of vast numbers of biological variables offer the potential for highly discriminatory diagnosis and prognosis; howev...
Chao Sima, Edward R. Dougherty
DAC
1999
ACM
13 years 10 months ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...
DLOG
2003
13 years 7 months ago
From Description Logic Provers to Knowledge Representation Systems
A description-logic based knowledge representation system is more than an inference engine for a particular description logic. A knowledge representation system must provide a num...
Deborah L. McGuinness, Peter F. Patel-Schneider
ECCC
2008
99views more  ECCC 2008»
13 years 6 months ago
Parallel Repetition in Projection Games and a Concentration Bound
In a two player game, a referee asks two cooperating players (who are not allowed to communicate) questions sampled from some distribution and decides whether they win or not base...
Anup Rao