Sciweavers

11573 search results - page 2270 / 2315
» Designing Relational Databases
Sort
View
CSREASAM
2003
15 years 1 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
DGO
2003
107views Education» more  DGO 2003»
15 years 1 months ago
Regulatory Information Management and Compliance Assistance
ct The REGNET Project aims to develop a formal information infrastructure for regulatory information management and compliance assistance. This paper discusses three components of ...
Shawn Kerrigan, Charles Heenan, Haoyi Wang, Kincho...
DLOG
2003
15 years 1 months ago
Relationships with other Formalisms
In this chapter, we are concerned with the relationship between Description Logics and other formalisms, regardless of whether they were designed for knowledge representation issu...
Ulrike Sattler, Diego Calvanese, Ralf Molitor
IJCAI
2001
15 years 1 months ago
Executing Reactive, Model-based Programs through Graph-based Temporal Planning
In the future, webs of unmanned air and space vehicles will act together to robustly perform elaborate missions in uncertain environments. We coordinate these systems by introduci...
Phil Kim, Brian C. Williams, Mark Abramson
EUSFLAT
2003
131views Fuzzy Logic» more  EUSFLAT 2003»
15 years 1 months ago
From communication networks to fuzzy sets
In 1931 and 1935, Ernst Adolph Guillemin, professor of electrical engineering at Masachusetts Institute of Technology (MIT), published the two volumes of his book “Communication...
Rudolf Seising
« Prev « First page 2270 / 2315 Last » Next »