Sciweavers

90 search results - page 7 / 18
» Conditional and Composite Constraints with Preferences
Sort
View
ENTCS
2008
150views more  ENTCS 2008»
13 years 7 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
AI
2008
Springer
13 years 7 months ago
Graphically structured value-function compilation
Classical work on eliciting and representing preferences over multi-attribute alternatives has attempted to recognize conditions under which value functions take on particularly s...
Ronen I. Brafman, Carmel Domshlak
CVPR
2012
IEEE
11 years 10 months ago
Multiclass pixel labeling with non-local matching constraints
A popular approach to pixel labeling problems, such as multiclass image segmentation, is to construct a pairwise conditional Markov random field (CRF) over image pixels where the...
Stephen Gould
IEEESCC
2010
IEEE
13 years 9 months ago
A Model for Visual Specification of E-contracts
Abstract--In a web service composition, an electronic contract (e-contract) regulates how the services participating in the composition should behave, including the restrictions th...
Enrique Martinez, Gregorio Díaz, Marí...
ACL
1998
13 years 9 months ago
Eliminative Parsing with Graded Constraints
Abstract Resource adaptlvity" Because the sets of strucNatural language parsing is conceived to be a procedure of disambiguation, which successively reduces an initially total...
Johannes Heinecke, Jürgen Kunze, Wolfgang Men...