Sciweavers

4128 search results - page 85 / 826
» Learning and using relational theories
Sort
View
UTP
2010
15 years 3 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
164
Voted
ICA
2010
Springer
15 years 3 months ago
Time Series Causality Inference Using Echo State Networks
One potential strength of recurrent neural networks (RNNs) is their – theoretical – ability to find a connection between cause and consequence in time series in an constraint-...
Norbert Michael Mayer, Oliver Obst, Chang Yu-Chen
ICCV
2009
IEEE
16 years 10 months ago
A Theory of Active Object Localization
We present some theoretical results related to the problem of actively searching for a target in a 3D environment, under the constraint of a maximum search time. We define the o...
Alexander Andreopoulos, John K. Tsotsos
ACE
2004
162views Education» more  ACE 2004»
15 years 6 months ago
Computing Theory With Relevance
In computer science education, the topic of computing theory is one that is commonly not well received by students. Career-oriented students often view the topic as irrelevant, an...
Wayne Brookes
CADE
2006
Springer
16 years 5 months ago
On the Strength of Proof-Irrelevant Type Theories
We present a type theory with some proof-irrelevance built into the conversion rule. We argue that this feature is useful when type theory is used as the logical formalism underlyi...
Benjamin Werner