Sciweavers

1581 search results - page 174 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
154
Voted
ATAL
2003
Springer
15 years 8 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
127
Voted
APN
2005
Springer
15 years 9 months ago
Can I Execute My Scenario in Your Net?
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, give...
Gabriel Juhás, Robert Lorenz, Jörg Des...
157
Voted
ICTAI
2007
IEEE
15 years 10 months ago
Ontology-Based Object Recognition for Remote Sensing Image Interpretation
The multiplication of Very High Resolution (spatial or spectral) remote sensing images appears to be an opportunity to identify objects in urban and periurban areas. The classifi...
Nicolas Durand, Sébastien Derivaux, Germain...
95
Voted
ICTAI
2009
IEEE
15 years 10 months ago
Learning for Dynamic Subsumption
This paper presents an original dynamic subsumption technique for Boolean CNF formulae. It exploits simple and sufficient conditions to detect, during conflict analysis, clauses...
Youssef Hamadi, Saïd Jabbour, Lakhdar Sais
129
Voted
SARA
2009
Springer
15 years 10 months ago
Automatically Enhancing Constraint Model Instances during Tailoring
Tailoring solver-independent constraint instances to target solvers is an important component of automated constraint modelling. We augment the tailoring process by a set of enhan...
Andrea Rendl, Ian Miguel, Ian P. Gent, Christopher...