Sciweavers

1187 search results - page 109 / 238
» Computation in Extended Argumentation Frameworks
Sort
View
LICS
2003
IEEE
15 years 6 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
AISC
1994
Springer
15 years 5 months ago
Using Commutativity Properties for Controlling Coercions
This paper investigates some soundness conditions which have to be fulfilled in systems with coercions and generic operators. A result of Reynolds on unrestricted generic operators...
Stephan A. Missura, Andreas Weber
MVA
2007
112views Computer Vision» more  MVA 2007»
15 years 3 months ago
Probabilistically Semantic Labeling of IR Image for UAV
Applying computer vision technology to IR (Infra-Red) images for UAV (Unmanned Aerial Vehicle) applications is difficult due to its characteristics which differ from common image ...
Teng Li, Jihwan Woo, In-So Kweon
AAAI
2000
15 years 2 months ago
Solving a Supply Chain Optimization Problem Collaboratively
We propose a novel algorithmic framework to solve an integrated planning and scheduling problem in supply chain management. This problem involves the integration of an inventory m...
Hoong Chuin Lau, Andrew Lim, Qi Zhang Liu
CORR
2011
Springer
137views Education» more  CORR 2011»
14 years 8 months ago
Existential witness extraction in classical realizability and via a negative translation
Abstract. We show how to extract existential witnesses from classical proofs using Krivine’s classical realizability—where classical proofs are interpreted as λ-terms with the...
Alexandre Miquel