Sciweavers

1778 search results - page 172 / 356
» Building a Knowledge Base: An Example
Sort
View
146
Voted
IPAW
2010
15 years 23 days ago
Provenance of Software Development Processes
Abstract. "Why does the build fail currently?" - This and similar questions arise on a daily basis in software development processes (SDP). There is no easy way to answer...
Heinrich Wendel, Markus Kunde, Andreas Schreiber
117
Voted
ETFA
2006
IEEE
15 years 9 months ago
Synthesis of Distributed Controllers by Means of a Monolithic Approach
Abstract. In this paper, reverse partially-marked safe net condition/event systems (RsNCES) are introduced, rules of their functioning are defined and convenient interpretation met...
Dirk Missal, Hans-Michael Hanisch
149
Voted
PUK
2000
15 years 4 months ago
An Accessibility graph learning approach for task planning in large domains
Abstract. In the stream of research that aims to speed up practical planners, we propose a new approach to task planning based on Probabilistic Roadmap Methods (PRM). Our contribut...
Emmanuel Guere, Rachid Alami
130
Voted
IVA
2010
Springer
15 years 1 months ago
Interactive Motion Modeling and Parameterization by Direct Demonstration
Abstract. While interactive virtual humans are becoming widely used in education, training and therapeutic applications, building animations which are both realistic and parameteri...
Carlo Camporesi, Yazhou Huang, Marcelo Kallmann
132
Voted
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
15 years 7 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay