Sciweavers

314 search results - page 50 / 63
» Heuristics in Conflict Resolution
Sort
View
CEAS
2006
Springer
15 years 1 months ago
Modeling Identity in Archival Collections of Email: A Preliminary Study
Access to historically significant email archives poses challenges that arise less often in personal collections. Most notably, searchers may need help making sense of the identit...
Tamer Elsayed, Douglas W. Oard
65
Voted
ICS
1995
Tsinghua U.
15 years 1 months ago
Gated SSA-based Demand-Driven Symbolic Analysis for Parallelizing Compilers
In this paper, we present a GSA-based technique that performs more e cient and more precise symbolic analysis of predicated assignments, recurrences and index arrays. The e ciency...
Peng Tu, David A. Padua
IJCAI
1997
14 years 11 months ago
Scaling the Dynamic Approach to Autonomous Path Planning: Planning Horizon Dynamics
In the dynamical systems approach to robot path planning both sensed and remembered information contribute to shape a nonlinear vector eld that governs the behavior of an autonomo...
Edward W. Large, Henrik I. Christensen, Ruzena Baj...
WOA
2007
14 years 10 months ago
Conceptual Foundations of Interrogative Agents
—Reasoning by interrogation is one of the most ancient and experimented ways of reasoning. Originated by the Aristotelian elenchus, it has been used for many purposes, such as th...
Vincenzo Deufemia, Giuseppe Polese, Genoveffa Tort...
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
14 years 9 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash