Sciweavers

784 search results - page 136 / 157
» An underlying model for defeat mechanisms
Sort
View
CEC
2009
IEEE
15 years 1 months ago
The coevolution of loyalty and cooperation
— Humans are inclined to engage in long-lasting relationships whose stability does not only rely on cooperation, but often also on loyalty — our tendency to keep interacting wi...
Sven Van Segbroeck, Francisco C. Santos, Ann Now&e...
80
Voted
LOGCOM
2008
94views more  LOGCOM 2008»
14 years 10 months ago
Preservation of Interpolation Features by Fibring
Fibring is a metalogical constructor that permits to combine different logics by operating on their deductive systems under certain natural restrictions, as for example that the t...
Walter Alexandre Carnielli, João Rasga, Cri...
77
Voted
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 8 months ago
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
The safety of infinite state systems can be checked by a backward reachability procedure. For certain classes of systems, it is possible to prove the termination of the procedure ...
Silvio Ghilardi, Silvio Ranise
96
Voted
TON
2010
175views more  TON 2010»
14 years 5 months ago
Cooperative Adaptive Spectrum Sharing in Cognitive Radio Networks
The cognitive radio (CR) paradigm calls for open spectrum access according to a predetermined etiquette. Under this paradigm, CR nodes access the spectrum opportunistically by cont...
Haythem Bany Salameh, Marwan Krunz, Ossama Younis
99
Voted
EDBT
2009
ACM
186views Database» more  EDBT 2009»
15 years 5 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...