Sciweavers

8658 search results - page 229 / 1732
» Models of Command and Control
Sort
View
123
Voted
TCS
2010
15 years 1 months ago
Alternating states for dual nondeterminism in imperative programming
The refinement calculus of Back, Morgan, Morris, and others is based on monotone predicate transformers (weakest preconditions) where conjunctions stand for demonic choices betwee...
Wim H. Hesselink
115
Voted
SOCIALCOM
2010
15 years 15 days ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
109
Voted
JMLR
2010
152views more  JMLR 2010»
14 years 9 months ago
The SHOGUN Machine Learning Toolbox
We have developed a machine learning toolbox, called SHOGUN, which is designed for unified large-scale learning for a broad range of feature types and learning settings. It offers...
Sören Sonnenburg, Gunnar Rätsch, Sebasti...
128
Voted
JMLR
2010
136views more  JMLR 2010»
14 years 9 months ago
Conceptual Imitation Learning: An Application to Human-robot Interaction
In general, imitation is imprecisely used to address different levels of social learning from high level knowledge transfer to low level regeneration of motor commands. However, t...
Hossein Hajimirsadeghi, Majid Nili Ahmadabadi, Mos...
118
Voted
OTM
2005
Springer
15 years 8 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert