Sciweavers

980 search results - page 28 / 196
» On Negative Bases
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
JMIV
2008
83views more  JMIV 2008»
13 years 7 months ago
On Straight Line Segment Detection
In this paper we propose a comprehensive method for detecting straight line segments in any digital image, accurately controlling both false positive and false negative detections....
Rafael Grompone von Gioi, Jérémie Ja...
AAAI
1990
13 years 8 months ago
Computing Stable Models by Using the ATMS
An algorithm is described which computes stable models of propositional logic programs with negation as failure using the Assumption Based Truth Maintenance mechanism. Since stabl...
Kave Eshghi
AAAI
1998
13 years 9 months ago
Computing Intersections of Horn Theories for Reasoning with Models
We consider computational issues in combining logical knowledge bases represented by their characteristic models; in particular, we study taking their logical intersection. We pre...
Thomas Eiter, Toshihide Ibaraki, Kazuhisa Makino
BSL
1999
103views more  BSL 1999»
13 years 7 months ago
The logic of bunched implications
We consider a classical (propositional) version, CBI, of O'Hearn and Pym's logic of bunched implications (BI) from a model- and prooftheoretic perspective. We present a c...
Peter W. O'Hearn, David J. Pym