Sciweavers

5255 search results - page 960 / 1051
» Formal Methods for Privacy
Sort
View
AAMAS
2008
Springer
13 years 10 months ago
Anticipation based on constraint processing in a multi-agent context
Anticipation is a general concept used and applied in various domains. Many studies in the field of artificial intelligence have investigated the capacity for anticipation. In thi...
Arnaud Doniec, René Mandiau, Sylvain Piecho...
COGSCI
2010
134views more  COGSCI 2010»
13 years 10 months ago
A Model of Knower-Level Behavior in Number Concept Development
We develop and evaluate a model of behavior on the Give-N task, a commonly used measure of young children's number knowledge. Our model uses the knower-level theory of how ch...
Michael D. Lee, Barbara W. Sarnecka
CJ
2008
97views more  CJ 2008»
13 years 10 months ago
Three Kinds of Probabilistic Induction: Universal Distributions and Convergence Theorems
We will describe three kinds of probabilistic induction problems, and give general solutions for each , with associated convergence theorems that show they tend to give good proba...
Ray J. Solomonoff
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 10 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 10 months ago
Certifying cost annotations in compilers
We discuss the problem of building a compiler which can lift in a provably correct way pieces of information on the execution cost of the object code to cost annotations on the so...
Roberto M. Amadio, Nicholas Ayache, Yann Ré...