Sciweavers

1268 search results - page 244 / 254
» Modeling Natural Language Communication in Database Semantic...
Sort
View
CONCUR
2010
Springer
13 years 8 months ago
Obliging Games
Abstract. Graph games of infinite length provide a natural model for open reactive systems: one player (Eve) represents the controller and the other player (Adam) represents the en...
Krishnendu Chatterjee, Florian Horn, Christof L&ou...
AAAI
1994
13 years 8 months ago
Teleassistance: Contextual Guidance for Autonomous Manipulation
We present teleassistance, a two-tiered control structure for robotic manipulation that combines the advantages of autonomy and teleoperation. At the top level, a teleoperator pro...
Polly K. Pook, Dana H. Ballard
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 25 days ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
QSIC
2007
IEEE
14 years 1 months ago
Automatic Quality Assessment of SRS Text by Means of a Decision-Tree-Based Text Classifier
The success of a software project is largely dependent upon the quality of the Software Requirements Specification (SRS) document, which serves as a medium to communicate user req...
Ishrar Hussain, Olga Ormandjieva, Leila Kosseim
WIDM
1999
ACM
13 years 11 months ago
An Efficient Plan Execution System for Information Management Agents
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...