Sciweavers

757 search results - page 48 / 152
» How to decide
Sort
View
ENTCS
2007
156views more  ENTCS 2007»
13 years 7 months ago
Bounded Model Checking with Parametric Data Structures
Bounded Model Checking (BMC) is a successful refutation method to detect errors in not only circuits and other binary systems but also in systems with more complex domains like ti...
Erika Ábrahám, Marc Herbstritt, Bern...
IJCAT
2007
100views more  IJCAT 2007»
13 years 7 months ago
INCA: qualitative reference framework for incentive mechanisms in P2P networks
: The existence of peer-to-peer networks is due to benefits brought by decentralisation of control and distribution of resources. It is expected that the usage of such networks wi...
Andrew Roczniak, Abdulmotaleb El-Saddik, Pierre L&...
COLING
2002
13 years 7 months ago
Text Authoring, Knowledge Acquisition and Description Logics
We present a principled approach to the problem of connecting a controlled document authoring system with a knowledge base. We start by describingclosed-world authoring situations...
Marc Dymetman
AROBOTS
1999
93views more  AROBOTS 1999»
13 years 7 months ago
A Robotic Excavator for Autonomous Truck Loading
Excavators are used for the rapid removal of soil and other materials in mines, quarries, and construction sites. The automation of these machines offers promise for increasing pro...
Anthony Stentz, John Bares, Sanjiv Singh, Patrick ...
CACM
1999
108views more  CACM 1999»
13 years 7 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld