Sciweavers

146 search results - page 9 / 30
» Putting Pointer Analysis to Work
Sort
View
IJCAI
2007
13 years 9 months ago
A Labeling Approach to the Computation of Credulous Acceptance in Argumentation
In recent years, the combinatorics of argumentation with arguments that can attack each other has been studied extensively. Especially, attack graphs (put in the focus of attentio...
Bart Verheij
JAPLL
2011
92views more  JAPLL 2011»
13 years 2 months ago
Norms as ascriptions of violations: An analysis in modal logic
The paper proposes a formal analysis of a theory of norms resulting from pulling together Anderson’s reduction, the analysis of counts-as, and a novel approach to the formal rep...
Davide Grossi
MCAM
2007
Springer
213views Multimedia» more  MCAM 2007»
14 years 1 months ago
Players and Ball Detection in Soccer Videos Based on Color Segmentation and Shape Analysis
This paper proposes a scheme to detect and locate the players and the ball on the grass playfield in soccer videos. We put forward a shape analysisbased approach to identify the pl...
Yu Huang, Joan Llach, Sitaram Bhagavathy
IH
2005
Springer
14 years 29 days ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
AAMAS
2008
Springer
13 years 7 months ago
User evaluation of a market-based recommender system
Recommender systems have been developed for a wide variety of applications (ranging from books, to holidays, to web pages). These systems have used a number of different approache...
Yan Zheng Wei, Nicholas R. Jennings, Luc Moreau, W...