Sciweavers

1646 search results - page 207 / 330
» Automatic generation of two-party computations
Sort
View
ICAIL
2003
ACM
15 years 6 months ago
Induction of Defeasible Logic Theories in the Legal Domain
Defeasible Logic is a promising representation for legal knowledge that appears to overcome many of the deficiencies of previous approaches to representing legal knowledge. Unfor...
Benjamin Johnston, Guido Governatori
IDA
2003
Springer
15 years 6 months ago
A Logical Formalisation of the Fellegi-Holt Method of Data Cleaning
The Fellegi-Holt method automatically “corrects” data that fail some predefined requirements. Computer implementations of the method were used in many national statistics bure...
Agnes Boskovitz, Rajeev Goré, Markus Heglan...
ACIVS
2009
Springer
15 years 6 months ago
Unusual Activity Recognition in Noisy Environments
Abstract. In this paper we present a method for unusual activity recognition that is used in home environment monitoring. Monitoring systems are needed in elderly persons homes to ...
Matti Matilainen, Mark Barnard, Olli Silvén
CADE
2000
Springer
15 years 6 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
IFIP
1999
Springer
15 years 5 months ago
A Synthesis Algorithm for Modular Design of Pipelined Circuits
: This paper presents a synthesis algorithm for pipelined circuits. The circuit is specified as a collection of independent, looselycoupled modules connected by queues. The synthe...
Maria-Cristina V. Marinescu, Martin C. Rinard