Sciweavers

26496 search results - page 5265 / 5300
» An Approach to Computing Ethics
Sort
View
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
14 years 9 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
ENTCS
2002
144views more  ENTCS 2002»
14 years 9 months ago
Logics and Multi-agents: towards a new symbolic model of cognition
Abstract The last edition of CLIMA, held in 2001 in Paphos (Cyprus) ended with a panel session on the role of Computational Logic (CL) in Multi-Agent Systems (MAS). Two dimensions ...
Paolo Torroni
JAR
2000
145views more  JAR 2000»
14 years 9 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JCB
2000
146views more  JCB 2000»
14 years 9 months ago
Bayesian Segmentation of Protein Secondary Structure
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag
92
Voted
JFP
2000
163views more  JFP 2000»
14 years 9 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
« Prev « First page 5265 / 5300 Last » Next »