Sciweavers

531 search results - page 86 / 107
» An Argumentation-Based Approach for Practical Reasoning
Sort
View
127
Voted
SRDS
2010
IEEE
15 years 1 months ago
A Study on Latent Vulnerabilities
Abstract-Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptibl...
Beng Heng Ng, Xin Hu, Atul Prakash
135
Voted
ELECTRONICMARKETS
2010
124views more  ELECTRONICMARKETS 2010»
15 years 29 days ago
The difficulty of studying inter-organisational IS phenomena on large scales: critical reflections on a research journey
We argue that certain theoretical commitments that underpin much existing Interorganisational Information Systems (IOIS) research at small scales become untenable when IOIS are st...
Kai Reimers, Robert B. Johnston, Stefan Klein
124
Voted
FUIN
2010
143views more  FUIN 2010»
15 years 28 days ago
Cluster Tree Elimination for Distributed Constraint Optimization with Quality Guarantees
Some distributed constraint optimization algorithms use a linear number of messages in the number of agents, but of exponential size. This is often the main limitation for their pr...
Ismel Brito, Pedro Meseguer
151
Voted
CVPR
2011
IEEE
15 years 10 days ago
Adequate Reconstruction of Transparent Objects on a Shoestring Budget
Reconstructing transparent objects is a challenging problem. While producing reasonable results for quite complex objects, existing approaches require custom calibration or somewh...
Sai-Kit Yeung, Tai-Pang Wu, Chi-keung Tang, Tony F...
137
Voted
JCST
2010
189views more  JCST 2010»
14 years 10 months ago
Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational problem. Traditionally, such analys...
Osman Hasan, Sofiène Tahar