Sciweavers

10602 search results - page 42 / 2121
» Weakly Useful Sequences
Sort
View
DALT
2008
Springer
13 years 11 months ago
Iterated Belief Revision in the Face of Uncertain Communication
Abstract. This paper offers a formalization of iterated belief revision for multiagent communication using the logic of communication graphs introduced in [15]. In this study we co...
Yoshitaka Suzuki, Satoshi Tojo, Stijn De Saeger
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
PAMI
2002
92views more  PAMI 2002»
13 years 8 months ago
Oriented Structure of the Occlusion Distortion: Is It Reliable?
In the energy spectrum of an occlusion sequence, the distortion term has the same orientation as the velocity of the occluding signal. Recent works claimed that this oriented struc...
Weichuan Yu, Gerald Sommer, Steven S. Beauchemin, ...
HICSS
2008
IEEE
101views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Value of Weak vs. Strong Ties between Individuals and Projects for New Product Review
This study extends the concept of weak and strong ties to the relationship between an individual and a project, in the context of a formal review process. Using data collected fro...
Lynne P. Cooper
TPHOL
2007
IEEE
14 years 3 months ago
Operational Reasoning for Concurrent Caml Programs and Weak Memory Models
This paper concerns the formal semantics of programming languages, and the specification and verification of software. We are interested in the verification of real programs, wr...
Tom Ridge