Sciweavers

1414 search results - page 109 / 283
» Combining Intruder Theories
Sort
View
ICFP
2008
ACM
16 years 21 days ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...
114
Voted
ATAL
2003
Springer
15 years 6 months ago
Rational action in agent programs with prioritized goals
Agent theories and agent programs are two very different styles of specification of agent behavior. The former are declarative in nature, while the latter have an imperative fl...
Sebastian Sardiña, Steven Shapiro
105
Voted
ACL
2004
15 years 2 months ago
Evaluating Centering-Based Metrics of Coherence
We use a reliably annotated corpus to compare metrics of coherence based on Centering Theory with respect to their potential usefulness for text structuring in natural language ge...
Nikiforos Karamanis, Massimo Poesio, Chris Mellish...
113
Voted
ML
2006
ACM
143views Machine Learning» more  ML 2006»
15 years 20 days ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
207
Voted
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
14 years 12 days ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...