Sciweavers

1414 search results - page 76 / 283
» Combining Intruder Theories
Sort
View
ACSW
2004
13 years 11 months ago
Clustering Stream Data by Regression Analysis
In data clustering, many approaches have been proposed such as K-means method and hierarchical method. One of the problems is that the results depend heavily on initial values and...
Masahiro Motoyoshi, Takao Miura, Isamu Shioya
SYNTHESE
2008
88views more  SYNTHESE 2008»
13 years 10 months ago
Interpolation in computing science: the semantics of modularization
The Interpolation Theorem, first formulated and proved by W. Craig fifty years ago for predicate logic, has been extended to many other logical frameworks and is being applied in s...
Gerard R. Renardel de Lavalette
CORR
2000
Springer
134views Education» more  CORR 2000»
13 years 9 months ago
Learning Complexity Dimensions for a Continuous-Time Control System
This paper takes a computational learning theory approach to a problem of linear systems identification. It is assumed that inputs are generated randomly from a known class consist...
Pirkko Kuusela, Daniel Ocone, Eduardo D. Sontag
FLAIRS
2003
13 years 11 months ago
Proving Harder Theorems by Axiom Reduction
Automated Theorem Proving (ATP) problems may contain unnecessary axioms, either because some of the axiomatization of the theory is irrelevant to the particular theorem, or becaus...
Geoff Sutcliffe, Alexander Dvorský
SIAMCOMP
2010
96views more  SIAMCOMP 2010»
13 years 4 months ago
Quantified Equality Constraints
An equality template (also equality constraint language) is a relational structure with infinite universe whose relations can be defined by boolean combinations of equalities. We ...
Manuel Bodirsky, Hubie Chen