Sciweavers

1778 search results - page 220 / 356
» Building a Knowledge Base: An Example
Sort
View
99
Voted
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 6 months ago
Verifying Trustworthiness Requirements in Distributed Systems with Formal Log-file Analysis
The paper reports on an analysis technology based on the tracing approach to test trustworthy requirements of a distributed system. The system under test is instrumented such that...
Andreas Ulrich, Hesham Hallal, Alexandre Petrenko,...
109
Voted
AGTIVE
2003
Springer
15 years 6 months ago
On Graphs in Conceptual Engineering Design
Abstract. This paper deals with knowledge-based computer aided design. A novel method giving additional support for conceptual design is presented. In this method, a designer firs...
Janusz Szuba, Agnieszka Ozimek, Andy Schürr
117
Voted
LOPSTR
2001
Springer
15 years 5 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
VISUALIZATION
1997
IEEE
15 years 5 months ago
Image synthesis from a sparse set of views
We present an image synthesis methodology and a system built around it. Given a sparse set of photographs taken from unknown viewpoints, the system generates images from new, diff...
Qian Chen, Gérard G. Medioni
107
Voted
COLT
1994
Springer
15 years 4 months ago
Rigorous Learning Curve Bounds from Statistical Mechanics
In this paper we introduce and investigate a mathematically rigorous theory of learning curves that is based on ideas from statistical mechanics. The advantage of our theory over ...
David Haussler, H. Sebastian Seung, Michael J. Kea...