Sciweavers

20833 search results - page 3859 / 4167
» Hidden process models
Sort
View
IJAIT
2000
142views more  IJAIT 2000»
15 years 4 months ago
Adequacy of Limited Testing for Knowledge Based Systems
Knowledge-based engineering and computational intelligence are expected to become core technologies in the design and manufacturing for the next generation of space exploration mi...
Tim Menzies, Bojan Cukic
EWC
2002
90views more  EWC 2002»
15 years 4 months ago
An Efficient Adaptive Procedure for Three-Dimensional Fragmentation Simulations
We present a simple set of data structures, and a collection of methods for constructing and updating the structures, designed to support the use of cohesive elements in simulation...
Anna Pandolfi, Michael Ortiz
151
Voted
RAS
2000
161views more  RAS 2000»
15 years 4 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
SAJ
2000
129views more  SAJ 2000»
15 years 4 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha
IJCIA
2002
137views more  IJCIA 2002»
15 years 4 months ago
Co-Evolution in Social Interactions
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Hiroshi Sato, Akira Namatame
« Prev « First page 3859 / 4167 Last » Next »