Sciweavers

128 search results - page 15 / 26
» Two-Level Modeling
Sort
View
CIE
2007
Springer
14 years 1 months ago
Quotients over Minimal Type Theory
Abstract. We consider an extensional version, called qmTT, of the intensional Minimal Type Theory mTT, introduced in a previous paper with G. Sambin, enriched with proof-irrelevanc...
Maria Emilia Maietti
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
14 years 1 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
RSEISP
2007
Springer
14 years 1 months ago
Interpreting Low and High Order Rules: A Granular Computing Approach
The main objective of this paper is to provide a granular computing based interpretation of rules representing two levels of knowledge. This is done by adopting and adapting the de...
Yiyu Yao, Bing Zhou, Yaohua Chen
ICRA
2002
IEEE
85views Robotics» more  ICRA 2002»
14 years 13 days ago
Self-Generation by a Mobile Robot of Topological Maps of Corridors
In the present paper a system for generation of topological maps is going to be presented. This system is considered as one of the deliberative skills of the mobile robots architec...
Verónica Egido, Ramón Barber, Mar&ia...
ICMLA
2009
13 years 5 months ago
Multiagent Transfer Learning via Assignment-Based Decomposition
We describe a system that successfully transfers value function knowledge across multiple subdomains of realtime strategy games in the context of multiagent reinforcement learning....
Scott Proper, Prasad Tadepalli