Sciweavers

81 search results - page 11 / 17
» Modelling and Executing Complex and Dynamic Business Process...
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 19 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
PLDI
2012
ACM
11 years 9 months ago
Dynamic synthesis for relaxed memory models
Modern architectures implement relaxed memory models which may reorder memory operations or execute them non-atomically. Special instructions called memory fences are provided, al...
Feng Liu, Nayden Nedev, Nedyalko Prisadnikov, Mart...
EUROSYS
2010
ACM
14 years 1 months ago
XCPU3: Workload Distribution and Aggregation
The mainstream adoption of cluster, grid, and most recently cloud computing models have broadened the applicability of parallel programming from scientific communities to the bus...
Pravin Shinde, Eric Van Hensbergen
AAAI
2007
13 years 9 months ago
On the Partial Observability of Temporal Uncertainty
We explore a means to both model and reason about partial observability within the scope of constraintbased temporal reasoning. Prior studies of uncertainty in Temporal CSPs have ...
Michael D. Moffitt
DAGSTUHL
2003
13 years 8 months ago
The Future of Embodied Artificial Intelligence: Machine Consciousness?
The idea that internal models of the world might be useful has generally been rejected by embodied AI for the same reasons that led to its rejection by behaviour based robotics. Th...
Owen Holland