Sciweavers

762 search results - page 116 / 153
» Conditionally correct superoptimization
Sort
View
FC
2006
Springer
94views Cryptology» more  FC 2006»
14 years 1 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
FINTAL
2006
14 years 1 months ago
Incorporating External Information in Bayesian Classifiers Via Linear Feature Transformations
Naive Bayes classifier is a frequently used method in various natural language processing tasks. Inspired by a modified version of the method called the flexible Bayes classifier, ...
Tapio Pahikkala, Jorma Boberg, Aleksandr Myllä...
ATAL
1995
Springer
14 years 1 months ago
Foundations of a Logical Approach to Agent Programming
This paper describes a novel approach to high-level agent programming based on a highly developed logical theory of action. The user provides a specification of the agents’ bas...
Yves Lespérance, Hector J. Levesque, Fangzh...
SPIN
2000
Springer
14 years 1 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
ELP
1991
14 years 1 months ago
Natural Semantics and Some of Its Meta-Theory in Elf
Operational semantics provide a simple, high-level and elegant means of specifying interpreters for programming languages. In natural semantics, a form of operational semantics, p...
Spiro Michaylov, Frank Pfenning