Sciweavers

1478 search results - page 151 / 296
» Modular Complexity Analysis via Relative Complexity
Sort
View
ATAL
2009
Springer
14 years 3 months ago
False name manipulations in weighted voting games: splitting, merging and annexation
An important aspect of mechanism design in social choice protocols and multiagent systems is to discourage insincere and manipulative behaviour. We examine the computational compl...
Haris Aziz, Mike Paterson
ICDAR
2009
IEEE
14 years 4 months ago
Inductive Logic Programming for Symbol Recognition
In this paper, we make an attempt to use Inductive Logic Programming (ILP) to automatically learn non trivial descriptions of symbols, based on a formal description. This work is ...
K. C. Santosh, Bart Lamiroy, Jean-Philippe Ropers
COMPSAC
2006
IEEE
14 years 3 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
AGP
1997
IEEE
14 years 1 months ago
Sharing Revisited
Although the usual goal of sharing analysis is to detect which pairs of variables share, the standard choice for sharing analysis is a domain that characterizes setsharing. In thi...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 3 months ago
Stability in the self-organized evolution of networks
The modeling and analysis of large networks of autonomous agents is an important topic with applications in many different disciplines. One way of modeling the development of such...
Thomas Jansen, Madeleine Theile