Sciweavers

320 search results - page 22 / 64
» Conditionals and consequences
Sort
View
LICS
2003
IEEE
14 years 3 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
IUI
2003
ACM
14 years 3 months ago
A virtual patient based on qualitative simulation
In this paper, we describe the development of a virtual human to be used for training applications in the field of cardiac emergencies. The system integrates AI techniques for sim...
Marc Cavazza, Altion Simo
ESAW
2003
Springer
14 years 3 months ago
Competition, Cooperation, and Authorization
Abstract. Multi-agent systems considered in the paper consist of a finite number of agents, positions of which can be changed by system actions, and of an evaluation function whic...
Antoni W. Mazurkiewicz
GECCO
1999
Springer
126views Optimization» more  GECCO 1999»
14 years 2 months ago
Improving Genetic Algorithms by Search Space Reductions (with Applications to Flow Shop Scheduling)
Crossover operators that preserve common components can also preserve representation level constraints. Consequently, these constraints can be used to beneficially reduce the sea...
Stephen Y. Chen, Stephen F. Smith
HOPL
2007
14 years 1 months ago
Modula-2 and Oberon
This is an account of the development of the languages Modula-2 and Oberon. Together with their ancestors ALGOL 60 and Pascal they form a family called Algollike languages. Pascal...
Niklaus Wirth