Sciweavers

Share
ECCV
2004
Springer
9 years 8 months ago
A Fourier Theory for Cast Shadows
—Cast shadows can be significant in many computer vision applications, such as lighting-insensitive recognition and surface reconstruction. Nevertheless, most algorithms neglect ...
Ravi Ramamoorthi, Melissa L. Koudelka, Peter N. Be...
DEON
2004
Springer
9 years 8 months ago
Collective Obligations and Agents: Who Gets the Blame?
This work addresses the issue of obligations directed to groups of agents. Our main concern consists in providing a formal analysis of the structure connecting collective obligatio...
Davide Grossi, Frank Dignum, Lambèr M. M. R...
AMAST
2004
Springer
9 years 8 months ago
Formal JVM Code Analysis in JavaFAN
JavaFAN uses a Maude rewriting logic specification of the JVM semantics as the basis of a software analysis tool with competitive performance. It supports formal analysis of concu...
Azadeh Farzan, José Meseguer, Grigore Rosu
PASTE
2005
ACM
9 years 8 months ago
An empirical framework for comparing effectiveness of testing and property-based formal analysis
Today, many formal analysis tools are not only used to provide certainty but are also used to debug software systems – a role that has traditional been reserved for testing tool...
Jeremy S. Bradbury, James R. Cordy, Jürgen Di...
CIA
2007
Springer
9 years 8 months ago
Formal Analysis of Trust Dynamics in Human and Software Agent Experiments
Recognizing that trust states are mental states, this paper presents a formal analysis of the dynamics of trust in terms of the functional roles and representation relations for tr...
Tibor Bosse, Catholijn M. Jonker, Jan Treur, Dmytr...
ATAL
2009
Springer
9 years 9 months ago
A mathematical analysis of collective cognitive convergence
Multi-agent systems are an attractive approach to modeling systems of interacting entities, but in some cases mathematical models of these systems can offer complementary benefits...
H. Van Dyke Parunak
CCS
2009
ACM
9 years 9 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ECCV
2004
Springer
10 years 4 months ago
Visibility Analysis and Sensor Planning in Dynamic Environments
We analyze visibility from static sensors in a dynamic scene with moving obstacles (people). Such analysis is considered in a probabilistic sense in the context of multiple sensors...
Anurag Mittal, Larry S. Davis
books