Sciweavers

442 search results - page 55 / 89
» Model Checking of Systems Employing Commutative Functions
Sort
View
WWW
2003
ACM
14 years 8 months ago
On labeling schemes for the semantic web
This paper focuses on the optimization of the navigation through voluminous subsumption hierarchies of topics employed by Portal Catalogs like Netscape Open Directory (ODP). We ad...
Vassilis Christophides, Dimitris Plexousakis, Mich...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ILP
2003
Springer
14 years 18 days ago
ILP for Mathematical Discovery
We believe that AI programs written for discovery tasks will need to simultaneously employ a variety of reasoning techniques such as induction, abduction, deduction, calculation an...
Simon Colton, Stephen Muggleton
ICRA
2009
IEEE
164views Robotics» more  ICRA 2009»
14 years 2 months ago
Assigning cameras to subjects in video surveillance systems
— We consider the problem of tracking multiple agents moving amongst obstacles, using multiple cameras. Given an environment with obstacles, and many people moving through it, we...
Hazem El-Alfy, David Jacobs, Larry Davis
WIOPT
2005
IEEE
14 years 1 months ago
An Optimization Framework for Radio Resource Management Based on Utility vs. Price Tradeoff in WCDMA Systems
Abstract— In this paper we investigate Radio Resource Management strategies for multimedia networks driven by economic aspects such as users’ utility and service pricing. To th...
Leonardo Badia, Cristiano Saturni, Lorenzo Brunett...