Sciweavers

5255 search results - page 959 / 1051
» Formal Methods for Privacy
Sort
View
SOFTVIS
2010
ACM
13 years 10 months ago
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Developers must often diagnose anomalies in programs they only have a partial knowledge of. As a result, they must simultaneously reverse engineer parts of the system they are unf...
Shen Lin 0003, François Taïani, Thomas...
ECAI
2010
Springer
13 years 10 months ago
Stream-Based Reasoning Support for Autonomous Systems
Abstract. For autonomous systems such as unmanned aerial vehicles to successfully perform complex missions, a great deal of embedded reasoning is required at varying levels of abst...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
CVPR
2008
IEEE
13 years 10 months ago
Hallucinating 3D facial shapes
This paper focuses on hallucinating a facial shape from a low-resolution 3D facial shape. Firstly, we give a constrained conformal embedding of 3D shape in R2 , which establishes ...
Gang Pan, Song Han, Zhaohui Wu
GLOBECOM
2008
IEEE
13 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
AAMAS
2008
Springer
13 years 10 months ago
Logic-based automated multi-issue bilateral negotiation in peer-to-peer e-marketplaces
Abstract. We present a novel logic-based framework to automate multi-issue bilateral negotiation in e-commerce settings. The approach exploits logic as communication language among...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...