Sciweavers

1792 search results - page 232 / 359
» e-Participation and Decision Analysis
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 4 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
ISIPTA
2005
IEEE
146views Mathematics» more  ISIPTA 2005»
15 years 4 months ago
Arithmetic on Random Variables: Squeezing the Envelopes with New Joint Distribution Constraints
Uncertainty is a key issue in decision analysis and other kinds of applications. Researchers have developed a number of approaches to address computations on uncertain quantities....
Jianzhong Zhang 0004, Daniel Berleant
SASN
2005
ACM
15 years 4 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
CAV
2005
Springer
122views Hardware» more  CAV 2005»
15 years 4 months ago
Interpolant-Based Transition Relation Approximation
Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, sof...
Ranjit Jhala, Kenneth L. McMillan
GECCO
2005
Springer
153views Optimization» more  GECCO 2005»
15 years 4 months ago
Harmony search for structural design
Various algorithms have been developed and applied to structural optimization, in which cross-sectional areas of structure members are assumed to be continuous. In most cases of p...
Zong Woo Geem, Kang Seok Lee, Chung-Li Tseng