Sciweavers

5378 search results - page 844 / 1076
» Base Logics in Argumentation
Sort
View
IJAR
2008
92views more  IJAR 2008»
13 years 10 months ago
Predicting causality ascriptions from background knowledge: model and experimental validation
A model is defined that predicts an agent's ascriptions of causality (and related notions of facilitation and justification) between two events in a chain, based on backgroun...
Jean-François Bonnefon, Rui Da Silva Neves,...
ENVSOFT
2006
122views more  ENVSOFT 2006»
13 years 10 months ago
Automatic identification of oil spills on satellite images
A fully automated system for the identification of possible oil spills present on Synthetic Aperture Radar (SAR) satellite images based on artificial intelligence fuzzy logic has ...
Iphigenia Keramitsoglou, Constantinos Cartalis, Ch...
IJISEC
2008
101views more  IJISEC 2008»
13 years 10 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
IJNSEC
2008
75views more  IJNSEC 2008»
13 years 10 months ago
A Key Management Scheme for Hierarchical Access Control in Group Communication
In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered...
Qiong Zhang, Yuke Wang, Jason P. Jue
JAR
2008
98views more  JAR 2008»
13 years 10 months ago
A Mechanical Analysis of Program Verification Strategies
We analyze three proof strategies commonly used in deductive verification of deterministic sequential programs formalized with operational semantics. The strategies are: (i) stepw...
Sandip Ray, Warren A. Hunt Jr., John Matthews, J. ...