Sciweavers

1512 search results - page 223 / 303
» When Suboptimal Rules
Sort
View
CEC
2007
IEEE
15 years 10 months ago
Repository method to suit different investment strategies
— This work is motivated by the interest in finding significant movements in financial stock prices. The detection of such movements is important because these could represent...
Alma Lilia Garcia-Almanza, Edward P. K. Tsang
COMPSAC
2007
IEEE
15 years 10 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
138
Voted
CSFW
2007
IEEE
15 years 10 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
153
Voted
DEXAW
2007
IEEE
138views Database» more  DEXAW 2007»
15 years 10 months ago
Machine Learning for Question Answering from Tabular Data
Question Answering (QA) systems automatically answer natural language questions in a human-like manner. One of the practical approaches to open domain QA consists in extracting fa...
Mahboob Alam Khalid, Valentin Jijkoun, Maarten de ...
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
15 years 10 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...