Sciweavers

827 search results - page 137 / 166
» Proof-Theoretic Soundness and Completeness
Sort
View
IWFM
2003
13 years 8 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
IJCAI
1997
13 years 8 months ago
Reifying Concepts in Description Logics
Practical applications of description logics (DLs) in knowledge-based systems have forced us to introduce the following features which are absent from existing DLs: • allowing a...
Liviu Badea
AAAI
1996
13 years 8 months ago
Formalizing Narratives Using Nested Circumscription
The representation of narratives of actions and observations is a current issue in Knowledge Representation, where traditional plan-oriented treatments of action seem to fall shor...
Chitta Baral, Alfredo Gabaldon, Alessandro Provett...
AAAI
1996
13 years 8 months ago
First-Order Conditional Logic Revisited
Conditional logics play an important role in recent attempts to investigate default reasoning. This paper investigates firstorder conditional logic. We show that, as for first-ord...
Nir Friedman, Joseph Y. Halpern, Daphne Koller
AAAI
1996
13 years 8 months ago
Planning to Gather Information
We describe Occam, a query planning algorithm that determines the best way to integrate data from dierent sources. As input, Occam takes a library of site descriptions and a user ...
Chung T. Kwok, Daniel S. Weld