Sciweavers

1634 search results - page 106 / 327
» Classifying Technical Terms
Sort
View
ENTCS
2010
130views more  ENTCS 2010»
13 years 9 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
LOGCOM
2008
97views more  LOGCOM 2008»
13 years 9 months ago
One-and-a-halfth-order Logic
The practice of first-order logic is replete with meta-level concepts. Most notably there are meta-variables ranging over formulae, variables, and terms, and properties of syntax s...
Murdoch James Gabbay, Aad Mathijssen
AROBOTS
2002
100views more  AROBOTS 2002»
13 years 8 months ago
The Demeter System for Automated Harvesting
Automation of agricultural harvesting equipment in the near term appears both economically viable and technically feasible. This paper describes the Demeter system for automated h...
Thomas Pilarski, Michael Happold, Henning Pangels,...
EMNLP
2010
13 years 7 months ago
A Simple Domain-Independent Probabilistic Approach to Generation
We present a simple, robust generation system which performs content selection and surface realization in a unified, domain-independent framework. In our approach, we break up the...
Gabor Angeli, Percy Liang, Dan Klein
GROUP
2010
ACM
13 years 7 months ago
The effects of life disruptions on home technology routines
Conflict and disruption are a part of everyday life, yet research in the home largely examines consensus and rituals. In this paper, we use Holmes and Rahe's categorization o...
Jill P. Dimond, Erika Shehan Poole, Sarita Yardi