Sciweavers

657 search results - page 18 / 132
» Recovering architectural assumptions
Sort
View
AI
2004
Springer
13 years 7 months ago
Logic-based subsumption architecture
We describe a logic-based AI architecture based on Brooks' subsumption architecture. In this architecture, we axiomatize different layers of control in First-Order Logic (FOL...
Eyal Amir, Pedrito Maynard-Zhang
OSDI
2008
ACM
14 years 8 months ago
Probabilistic Inference in Queueing Networks
Although queueing models have long been used to model the performance of computer systems, they are out of favor with practitioners, because they have a reputation for requiring u...
Charles A. Sutton, Michael I. Jordan
CVPR
2007
IEEE
14 years 2 months ago
Multiple Target Tracking Using Spatio-Temporal Markov Chain Monte Carlo Data Association
We propose a framework for general multiple target tracking, where the input is a set of candidate regions in each frame, as obtained from a state of the art background learning, ...
Qian Yu, Gérard G. Medioni, Isaac Cohen
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen