Sciweavers

1414 search results - page 51 / 283
» Combining Intruder Theories
Sort
View
AIED
2009
Springer
14 years 4 months ago
Student Knowledge Diagnosis Using Item Response Theory and Constraint-Based Modeling
One of the most popular student modeling techniques currently available is Constraint Based Modeling (CBM), which is based on Ohlsson's theory of learning from performance err...
Jaime Gálvez, Eduardo Guzmán, Ricard...
SEFM
2006
IEEE
14 years 3 months ago
A Theory of Singly-Linked Lists and its Extensible Decision Procedure
The key to many approaches to reason about pointerbased data structures is the availability of a decision procedure to automatically discharge proof obligations in a theory encomp...
Silvio Ranise, Calogero G. Zarba
WRLA
2010
13 years 8 months ago
A Maude Coherence Checker Tool for Conditional Order-Sorted Rewrite Theories
For a rewrite theory to be executable, its equations E should be (ground) confluent and terminating modulo the given axioms A, and their rules should be (ground) coherent with E m...
Francisco Durán, José Meseguer
DSN
2011
IEEE
12 years 9 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
CSL
2003
Springer
14 years 3 months ago
Generating All Abductive Explanations for Queries on Propositional Horn Theories
Abstract. Abduction is a fundamental mode of reasoning, which has taken on increasing importance in Artificial Intelligence (AI) and related disciplines. Computing abductive expla...
Thomas Eiter, Kazuhisa Makino