Sciweavers

2585 search results - page 199 / 517
» computing 1999
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
105
Voted
SIGCSE
1999
ACM
123views Education» more  SIGCSE 1999»
15 years 8 months ago
Do we teach the right algorithm design techniques?
Algorithms have cometo be recognizedasthe cornerstone of computing. Surprisingly, there has been little research or discussion of general techniques for designing algorithms. Thou...
Anany Levitin
ISIPTA
1999
IEEE
103views Mathematics» more  ISIPTA 1999»
15 years 8 months ago
A Review of Propagation Algorithms for Imprecise Probabilities
This paper reviews algorithms for local computation with imprecise probabilities. These algorithms try to solve problems of inference calculation of conditional or unconditional p...
Andrés Cano, Serafín Moral
ECSQARU
1999
Springer
15 years 8 months ago
An Alternative to Outward Propagation for Dempster-Shafer Belief Functions
Abstract. Given several Dempster-Shafer belief functions, the framework of valuation networks describes an efficient method for computing the marginal of the combined belief functi...
Norbert Lehmann, Rolf Haenni
125
Voted
COGSCI
2010
114views more  COGSCI 2010»
15 years 4 months ago
Strudel: A Corpus-Based Semantic Model Based on Properties and Types
Computational models of meaning trained on naturally occurring text successfully model human performance on tasks involving simple similarity measures, but they characterize meani...
Marco Baroni, Brian Murphy, Eduard Barbu, Massimo ...