Sciweavers

540 search results - page 78 / 108
» A Computational Logic Approach to Syllogisms in Human Reason...
Sort
View
109
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 4 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
101
Voted
CL
2000
Springer
15 years 4 months ago
Modelling Digital Circuits Problems with Set Constraints
A number of diagnostic and optimisation problems in Electronics Computer Aided Design have usually been handled either by specific tools or by mapping them into a general problem s...
Francisco Azevedo, Pedro Barahona
SAC
2010
ACM
15 years 7 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin
REX
1991
15 years 4 months ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
102
Voted
CVPR
2005
IEEE
16 years 2 months ago
2D Statistical Models of Facial Expressions for Realistic 3D Avatar Animation
We address the issue of modelling facial expressions for realistic 3D avatar animation. We introduce a hierarchical decomposition of a human face into different components and mod...
Lukasz Zalewski, Shaogang Gong