Sciweavers

373 search results - page 47 / 75
» Reclaiming Knowledge: A Case for Evidence-Based Information ...
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
ENTCS
2007
143views more  ENTCS 2007»
13 years 7 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
CDC
2010
IEEE
113views Control Systems» more  CDC 2010»
13 years 2 months ago
Independent vs. joint estimation in multi-agent iterative learning control
This paper studies iterative learning control (ILC) in a multi-agent framework. A group of agents simultaneously and repeatedly perform the same task. The agents improve their perf...
Angela Schöllig, Javier Alonso-Mora, Raffaell...
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
EMSOFT
2008
Springer
13 years 9 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...