Sciweavers

696 search results - page 66 / 140
» Explaining abstract counterexamples
Sort
View
ATAL
1997
Springer
15 years 7 months ago
A Framework for Argumentation-Based Negotiation
Abstract. Many autonomous agents operate in domains in which the cooperation of their fellow agents cannot be guaranteed. In such domains negotiation is essential to persuade other...
Carles Sierra, Nicholas R. Jennings, Pablo Noriega...
DEXA
1997
Springer
137views Database» more  DEXA 1997»
15 years 7 months ago
A Retrieval Mechanism for Semi-Structured Photographic Collections
Abstract. In this paper, a new approach for retrieval from semistructured photographic collections is described. We have developed a retrieval model based on the Dempster-Shafer th...
Joemon M. Jose, David J. Harper
FPL
1997
Springer
68views Hardware» more  FPL 1997»
15 years 7 months ago
Pipeline morphing and virtual pipelines
Abstract. Pipeline morphing is a simple but e ective technique for recon guring pipelined FPGA designs at run time. By overlapping computation and recon guration, the latency assoc...
Wayne Luk, Nabeel Shirazi, Shaori Guo, Peter Y. K....
126
Voted
ITP
2010
155views Mathematics» more  ITP 2010»
15 years 7 months ago
A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture
Abstract. This paper presents a new HOL4 formalization of the current ARM instruction set architecture, ARMv7. This is a modern RISC architecture with many advanced features. The f...
Anthony C. J. Fox, Magnus O. Myreen
127
Voted
ESOP
2007
Springer
15 years 7 months ago
Controlling the What and Where of Declassification in Language-Based Security
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...
Heiko Mantel, Alexander Reinhard