Sciweavers

3502 search results - page 586 / 701
» From Machine Learning to Machine Reasoning
Sort
View
CCS
2009
ACM
15 years 11 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
FQAS
2009
Springer
181views Database» more  FQAS 2009»
15 years 11 months ago
Interlingual Information Extraction as a Solution for Multilingual QA Systems
Information extraction systems have been dealt with at length from the viewpoint of users posing definite questions whose expected answer is to be found in a document collection. T...
Jesús Cardeñosa, Carolina Gallardo, ...
IPPS
2008
IEEE
15 years 11 months ago
A study of master-slave approaches to parallelize NSGA-II
Many of the optimization problems from the real world are multiobjective in nature, and the reference algorithm for multiobjective optimization is NSGA-II. Frequently, these probl...
Juan José Durillo, Antonio J. Nebro, Franci...
LICS
2007
IEEE
15 years 10 months ago
The Cost of Punctuality
In an influential paper titled “The Benefits of Relaxing Punctuality” [2], Alur, Feder, and Henzinger introduced Metric Interval Temporal Logic (MITL) as a fragment of the r...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...
PPDP
2007
Springer
15 years 10 months ago
Formalizing and verifying semantic type soundness of a simple compiler
We describe a semantic type soundness result, formalized in the Coq proof assistant, for a compiler from a simple imperative language with heap-allocated data into an idealized as...
Nick Benton, Uri Zarfaty