Sciweavers

2145 search results - page 306 / 429
» Lax Logical Relations
Sort
View
KCAP
2005
ACM
14 years 1 months ago
Knowledge transformations between frame systems and RDB systems
For decades, researchers in knowledge representation (KR) have argued for and against various choices in KR formalisms, such as Rules, Frames, Semantic nets, and Formal logic. In ...
John H. Gennari, Peter Mork, Hao Li
ASP
2005
Springer
14 years 1 months ago
An Experimental Study of Search Strategies and Heuristics in Answer Set Programming
Answer Set Programming (ASP) and propositional satisfiability (SAT) are closely related. In some recent work we have shown that, on a wide set of logic programs called “tight”...
Enrico Giunchiglia, Marco Maratea
FC
2005
Springer
119views Cryptology» more  FC 2005»
14 years 1 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
GECCO
2005
Springer
207views Optimization» more  GECCO 2005»
14 years 1 months ago
Adaptive crossover and mutation in genetic algorithms based on clustering technique
Instead of having fixed px and pm, this paper presents the use of fuzzy logic to adaptively tune px and pm for optimization of power electronic circuits throughout the process. By...
Jun Zhang, Henry Shu-Hung Chung, Jinghui Zhong
ICCSA
2005
Springer
14 years 1 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...