Sciweavers

6608 search results - page 1158 / 1322
» On the Completeness of Model Checking
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
ATAL
2005
Springer
15 years 10 months ago
Task delegation using experience-based multi-dimensional trust
Cooperation among autonomous agents involves an inherent degree of uncertainty. Agents determine for themselves when to initiate cooperation or to assist others, when to rescind c...
Nathan Griffiths
EMMCVPR
2005
Springer
15 years 10 months ago
Probabilistic Subgraph Matching Based on Convex Relaxation
We present a novel approach to the matching of subgraphs for object recognition in computer vision. Feature similarities between object model and scene graph are complemented with ...
Christian Schellewald, Christoph Schnörr
EMSOFT
2005
Springer
15 years 10 months ago
QoS control for optimality and safety
We propose a method for fine grain QoS control of real-time applications. The method allows adapting the overall system behavior by adequately setting the quality level parameter...
Jacques Combaz, Jean-Claude Fernandez, Thierry Lep...
FROCOS
2005
Springer
15 years 10 months ago
Combination of Isabelle/HOL with Automatic Tools
We describe results and status of a sub project of the Verisoft [1] project. While the Verisoft project aims at verification of a complete computer system starting with hardware a...
Sergey Tverdyshev
« Prev « First page 1158 / 1322 Last » Next »