Sciweavers

1953 search results - page 252 / 391
» Embedded Probabilistic Programming
Sort
View
ATAL
2010
Springer
15 years 3 months ago
Merging example plans into generalized plans for non-deterministic environments
We present a new approach for finding generalized contingent plans with loops and branches in situations where there is uncertainty in state properties and object quantities, but ...
Siddharth Srivastava, Neil Immerman, Shlomo Zilber...
113
Voted
CORR
2010
Springer
101views Education» more  CORR 2010»
15 years 2 months ago
Computing the Least Fixed Point of Positive Polynomial Systems
We consider equation systems of the form X1 = f1(X1, . . . , Xn), . . . , Xn = fn(X1, . . . , Xn) where f1, . . . , fn are polynomials with positive real coefficients. In vector fo...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
IJISEC
2008
119views more  IJISEC 2008»
15 years 2 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
JASIS
2006
108views more  JASIS 2006»
15 years 2 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
MP
2006
78views more  MP 2006»
15 years 2 months ago
Valid inequalities based on the interpolation procedure
We study the interpolation procedure of Gomory and Johnson (1972), which generates cutting planes for general integer programs from facets of cyclic group polyhedra. This idea has...
Sanjeeb Dash, Oktay Günlük