Sciweavers

384 search results - page 60 / 77
» The Zeno Argumentation Framework
Sort
View
HICSS
1997
IEEE
89views Biometrics» more  HICSS 1997»
13 years 11 months ago
Text Types in Hypermedia
The discipline of narratology has long recognized the need to classify documents as instances of different text types. We have discovered that classification is as applicable to h...
Stephen W. Smoliar, James D. Baker
ATAL
2007
Springer
13 years 11 months ago
Hypotheses refinement under topological communication constraints
We investigate the properties of a multiagent system where each (distributed) agent locally perceives its environment. Upon perception of an unexpected event, each agent locally c...
Gauvain Bourgne, Gael Hette, Nicolas Maudet, Suzan...
CADE
2008
Springer
14 years 7 months ago
Specification Predicates with Explicit Dependency Information
Specifications of programs use auxiliary symbols to encapsulate concepts for a variety of reasons: readability, reusability, structuring and, in particular, for writing recursive d...
Richard Bubel, Reiner Hähnle, Peter H. Schmit...
ICIAP
2003
ACM
14 years 7 months ago
A statistical rationalisation of Hartley's normalised eight-point algorithm
The eight-point algorithm of Hartley occupies an important place in computer vision, notably as a means of providing an initial value of the fundamental matrix for use in iterativ...
Wojciech Chojnacki, Michael J. Brooks, Anton van d...
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 2 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...