Sciweavers

ICAIL
2003
ACM
14 years 3 months ago
Induction of Defeasible Logic Theories in the Legal Domain
Defeasible Logic is a promising representation for legal knowledge that appears to overcome many of the deficiencies of previous approaches to representing legal knowledge. Unfor...
Benjamin Johnston, Guido Governatori
DAC
2003
ACM
14 years 3 months ago
Model order reduction of nonuniform transmission lines using integrated congruence transform
This paper presents a new algorithm based on Integrated Congruence transform for the analysis of both uniform and nonuniform transmission lines. The key advantage of the proposed ...
Emad Gad, Michel S. Nakhla
ACMICEC
2003
ACM
87views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
A comparison of two algorithms for multi-unit k-double auctions
We develop two algorithms to manage bid data in flexible, multi-unit double auctions. The first algorithm is a multi-unit extension of the 4-HEAP algorithm, and the second is a ...
Shengli Bao, Peter R. Wurman
TPHOL
2003
IEEE
14 years 3 months ago
Program Extraction from Large Proof Developments
Abstract. It is well known that mathematical proofs often contain (abstract) algorithms, but although these algorithms can be understood by a human, it still takes a lot of time an...
Luís Cruz-Filipe, Bas Spitters
SRDS
2003
IEEE
14 years 3 months ago
Autonomous Replication for High Availability in Unstructured P2P Systems
We consider the problem of increasing the availability of shared data in peer-to-peer (P2P) systems so that users can access any content, regardless of the current subset of onlin...
Francisco Matias Cuenca-Acuna, Richard P. Martin, ...
SIBGRAPI
2003
IEEE
14 years 3 months ago
A Hole-Filling Strategy for Reconstruction of Smooth Surfaces in Range Images
Creating models of real scenes is a complex task for which the use of traditional modelling techniques is inappropriate. For this task, laser rangefinders are frequently used to s...
Jianning Wang, Manuel M. Oliveira
PG
2003
IEEE
14 years 3 months ago
Breaking the Walls: Scene Partitioning and Portal Creation
In this paper we revisit the cells-and-portals visibility methods, originally developed for the special case of architectural interiors. We define an effectiveness measure for a ...
Alon Lerner, Yiorgos Chrysanthou, Daniel Cohen-Or
KBSE
2003
IEEE
14 years 3 months ago
Parallel Breadth-First Search LTL Model-Checking
We propose a practical parallel on-the-fly algorithm for enumerative LTL model-checking. The algorithm is designed for a cluster of workstations communicating via MPI. The detect...
Jiri Barnat, Lubos Brim, Jakub Chaloupka
IWPC
2003
IEEE
14 years 3 months ago
Effective, Automatic Procedure Extraction
Legacy code can often be made more understandable and maintainable by extracting out selected sets of statements to form procedures and replacing the extracted code with procedure...
Raghavan Komondoor, Susan Horwitz
ISCAS
2003
IEEE
167views Hardware» more  ISCAS 2003»
14 years 3 months ago
The multi-level paradigm for distributed fault detection in networks with unreliable processors
In this paper, we study the effectiveness of the multilevel paradigm in considerably reducing the diagnosis latency of distributed algorithms for fault detection in networks with ...
Krishnaiyan Thulasiraman, Ming-Shan Su, V. Goel