Sciweavers

456 search results - page 3 / 92
» Constraints for Argument Filterings
Sort
View
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
13 years 3 months ago
Argumentation Based Constraint Acquisition
Efficient acquisition of constraint networks is a key factor for the applicability of constraint problem solving methods. Current techniques ease knowledge acquisition by generati...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich
IJCAI
2007
13 years 7 months ago
A Lattice-Based Approach to Computing Warranted Beliefs in Skeptical Argumentation Frameworks
argumentation frameworks have played a major role as a way of understanding argumentbased inference, resulting in different argumentbased semantics. In order to make such semantic...
Carlos Iván Chesñevar, Guillermo Ric...
JMIV
2006
112views more  JMIV 2006»
13 years 5 months ago
Improving Deriche-style Recursive Gaussian Filters
Gaussian smoothing filters and Gaussian derivative filters can be estimated by recursive IIR filters, as shown by Deriche [3, 4]. The design of those filters does, however, not enf...
Gunnar Farnebäck, Carl-Fredrik Westin
TSE
2008
107views more  TSE 2008»
13 years 5 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICASSP
2011
IEEE
12 years 9 months ago
Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive fi
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a...
Hugo Reboredo, Vinay Uday Prabhu, Miguel R. D. Rod...