Sciweavers

282 search results - page 39 / 57
» Propositional Fusion Rules
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 7 months ago
Where are the hard manipulation problems?
One possible escape from the Gibbard-Satterthwaite theorem is computational complexity. For example, it is NP-hard to compute if the STV rule can be manipulated. However, there is...
Toby Walsh
CORR
2010
Springer
194views Education» more  CORR 2010»
13 years 5 months ago
A Focused Sequent Calculus Framework for Proof Search in Pure Type Systems
Basic proof search tactics in logic and type theory can be seen as the root-rst applications of rules in an appropriate sequent calculus, preferably without the redundancies gener...
Stéphane Lengrand, Roy Dyckhoff, James McKi...
ICIAP
2005
ACM
14 years 1 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
13 years 11 months ago
A general architecture for reliable decentralized supervisory control of discrete event systems
In this paper, we study the reliable decentralized supervisory control of discrete event systems (DESs) under the general architecture, in which the decision for controllable event...
Fuchun Liu, Hai Lin
CDC
2010
IEEE
128views Control Systems» more  CDC 2010»
13 years 2 months ago
Greedy sensor selection: Leveraging submodularity
ACT We consider the problem of sensor selection in resource constrained sensor networks. The fusion center selects a subset of k sensors from an available pool of m sensors accordi...
Manohar Shamaiah, Siddhartha Banerjee, Haris Vikal...