Sciweavers

2864 search results - page 502 / 573
» Constraint Programming in OPL
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 2 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
VR
2003
IEEE
163views Virtual Reality» more  VR 2003»
14 years 2 months ago
Ribbon Networks for Modeling Navigable Paths of Autonomous Agents in Virtual Urban Environments
This paper presents a real-time database modeling complex networks of intersecting roads and walkways in urban virtual environments. The database represents information about the ...
Peter Willemsen, Joseph K. Kearney, Hongling Wang
MM
2003
ACM
205views Multimedia» more  MM 2003»
14 years 2 months ago
AVE: automated home video editing
In this paper, we present a system that automates home video editing. This system automatically extracts a set of highlight segments from a set of raw home videos and aligns them ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
ATAL
2003
Springer
14 years 2 months ago
Constructing optimal policies for agents with constrained architectures
Optimal behavior is a very desirable property of autonomous agents and, as such, has received much attention over the years. However, making optimal decisions and executing optima...
Dmitri A. Dolgov, Edmund H. Durfee
ATAL
2003
Springer
14 years 2 months ago
Process Algebra for Agent Communication: A General Semantic Approach
Abstract. In this paper, we consider the process algebra ACPL, which models the basics of agent communication. This algebra combines the informationprocessing aspects of Concurrent...
Rogier M. van Eijk, Frank S. de Boer, Wiebe van de...