Sciweavers

6167 search results - page 103 / 1234
» Can Refinement be Automated
Sort
View
SPW
2005
Springer
15 years 9 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
IWEC
2004
15 years 5 months ago
From Artistry to Automation: A Structured Methodology for Procedural Content Creation
Procedural techniques will soon automate many aspects of content creation for computer games. We describe an efficient, deterministic, methodology for procedurally generating 3D ga...
Timothy Roden, Ian Parberry
ISICT
2003
15 years 5 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
WSC
2004
15 years 5 months ago
Automated Database and Schema-Based Data Interchange for Modeling and Simulation
Creating a simulation of a large enterprise system by manually coding all the details into a simulator tool is not just time consuming, but yields a system that is difficult to ma...
Gregory A. Harrison, David S. Maynard, Eytan Polla...
145
Voted
IJCAI
1997
15 years 5 months ago
A Set-Theoretic Approach to Automated Deduction in Graded Modal Logics
In the paper, we consider the problem of supporting automated reasoning in a large class of knowledge representation formalisms, including terminological and epistemic logics, who...
Angelo Montanari, Alberto Policriti