Sciweavers

2043 search results - page 364 / 409
» Reasoning About Security Models
Sort
View
EACL
2006
ACL Anthology
13 years 11 months ago
A Two-Stage Approach to Retrieving Answers for How-To Questions
This paper addresses the problem of automatically retrieving answers for how-to questions, focusing on those that inquire about the procedure for achieving a specific goal. For su...
Ling Yin
FORTE
2001
13 years 11 months ago
A Family of Resource-Bound Real-Time Process Algebras
The Algebra of Communicating Shared Resources (ACSR) is a timed process algebra which extends classical process algebras with the notion of a resource. It takes the view that the ...
Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Phi...
EON
2003
13 years 11 months ago
OntoTrack: Fast Browsing and Easy Editing of Large Ontologie
Abstract. OntoTrack is a new browsing and editing “in-one-view” ontology authoring tool. It combines a sophisticated graphical layout with mouse enabled editing features optimi...
Thorsten Liebig, Olaf Noppens
OPODIS
2004
13 years 11 months ago
A Constraint-Based Formalism for Consistency in Replicated Systems
Abstract. We present a formalism for modeling replication in a distributed system with concurrent users sharing information. It is based on actions, which represent operations requ...
Marc Shapiro, Karthikeyan Bhargavan, Nishith Krish...
AAAI
1997
13 years 11 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand