Sciweavers

6554 search results - page 1174 / 1311
» Constraint Logic Programming
Sort
View
144
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 3 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
122
Voted
CORR
2000
Springer
104views Education» more  CORR 2000»
15 years 3 months ago
ATLAS: A flexible and extensible architecture for linguistic annotation
We describe a formal model for annotating linguistic artifacts, from which we derive an application programming interface (API) to a tools for manipulating these annotations. The ...
Steven Bird, David Day, John S. Garofolo, John Hen...
145
Voted
CORR
2002
Springer
106views Education» more  CORR 2002»
15 years 3 months ago
Domain-Dependent Knowledge in Answer Set Planning
In this paper we consider three di erent kinds of domain dependent control knowledge (temporal, procedural and HTN-based) that are useful in planning. Our approach is declarative ...
Tran Cao Son, Chitta Baral, Tran Hoai Nam, Sheila ...
145
Voted
NGC
1998
Springer
115views Communications» more  NGC 1998»
15 years 3 months ago
On Semantic Resolution with Lemmaizing and Contraction and a Formal Treatment of Caching
Reducing redundancy in search has been a major concern for automated deduction. Subgoal-reduction strategies, such as those based on model elimination and implemented in Prolog te...
Maria Paola Bonacina, Jieh Hsiang
130
Voted
ICRA
2010
IEEE
147views Robotics» more  ICRA 2010»
15 years 2 months ago
Learning physically-instantiated game play through visual observation
Abstract— We present an integrated vision and robotic system that plays, and learns to play, simple physically-instantiated board games that are variants of TIC TAC TOE and HEXAP...
Andrei Barbu, Siddharth Narayanaswamy, Jeffrey Mar...
« Prev « First page 1174 / 1311 Last » Next »