Sciweavers

2043 search results - page 378 / 409
» Reasoning About Security Models
Sort
View
ATVA
2006
Springer
162views Hardware» more  ATVA 2006»
14 years 1 months ago
Predicate Abstraction of Programs with Non-linear Computation
e Abstraction of Programs With Non-linear Computation Songtao Xia1 Ben Di Vito2 Cesar Munoz3 1 NASA Postdoc at NASA Langley Research Center, Hampton, VA 2 NASA Langley Research Cen...
Songtao Xia, Ben Di Vito, César Muño...
ECCV
2006
Springer
14 years 1 months ago
Tracking of Multiple Objects Using Optical Flow Based Multiscale Elastic Matching
Abstract. A novel hybrid region-based and contour-based multiple object tracking model using optical flow based elastic matching is proposed. The proposed elastic matching model is...
Xingzhi Luo, Suchendra M. Bhandarkar
AAAI
1998
13 years 11 months ago
What Is Wrong With Us? Improving Robustness Through Social Diagnosis
1 Robust behavior in complex, dynamic environments mandates that intelligent agents autonomously monitor their own run-time behavior, detect and diagnose failures, and attempt reco...
Gal A. Kaminka, Milind Tambe
IJCSA
2006
91views more  IJCSA 2006»
13 years 10 months ago
Possibilistic Explanation
The philosophy literature has been struggling with the problem of defining causality. There has been extensive discussion about it. Hume taught that talk of causation was metaphys...
Sara Boutouhami, Aïcha Mokhtari
AI
2005
Springer
13 years 9 months ago
Knowledge updates: Semantics and complexity issues
We consider the problem of how an agent's knowledge can be updated. We propose a formal method of knowledge update on the basis of the semantics of modal logic S5. In our met...
Chitta Baral, Yan Zhang