Sciweavers

2588 search results - page 19 / 518
» Applications of Kolmogorov complexity to computable model th...
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 8 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
LOGCOM
2010
123views more  LOGCOM 2010»
14 years 9 months ago
The Hyper Tableaux Calculus with Equality and an Application to Finite Model Computation
In most theorem proving applications, a proper treatment of equational theories or equality is mandatory. In this paper we show how to integrate a modern treatment of equality in ...
Peter Baumgartner, Ulrich Furbach, Björn Pelz...
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
15 years 11 months ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek
CVPR
2011
IEEE
14 years 7 months ago
Generalized Projection Based M-Estimator: Theory and Applications
We introduce a robust estimator called generalized projection based M-estimator (gpbM) which does not require the user to specify any scale parameters. For multiple inlier structu...
Sushil Mittal, Saket Anand, Peter Meer
AI
2011
Springer
14 years 6 months ago
Approximation of action theories and its application to conformant planning
This paper describes our methodology for building conformant planners, which is based on recent advances in the theory of action and change and answer set programming. The develop...
Phan Huy Tu, Tran Cao Son, Michael Gelfond, A. Ric...