Sciweavers

4128 search results - page 85 / 826
» Learning and using relational theories
Sort
View
UTP
2010
13 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ICA
2010
Springer
13 years 8 months ago
Time Series Causality Inference Using Echo State Networks
One potential strength of recurrent neural networks (RNNs) is their – theoretical – ability to find a connection between cause and consequence in time series in an constraint-...
Norbert Michael Mayer, Oliver Obst, Chang Yu-Chen
ICCV
2009
IEEE
15 years 3 months ago
A Theory of Active Object Localization
We present some theoretical results related to the problem of actively searching for a target in a 3D environment, under the constraint of a maximum search time. We define the o...
Alexander Andreopoulos, John K. Tsotsos
ACE
2004
162views Education» more  ACE 2004»
13 years 11 months ago
Computing Theory With Relevance
In computer science education, the topic of computing theory is one that is commonly not well received by students. Career-oriented students often view the topic as irrelevant, an...
Wayne Brookes
CADE
2006
Springer
14 years 10 months ago
On the Strength of Proof-Irrelevant Type Theories
We present a type theory with some proof-irrelevance built into the conversion rule. We argue that this feature is useful when type theory is used as the logical formalism underlyi...
Benjamin Werner