Sciweavers

1588 search results - page 251 / 318
» On the Logic of Constitutive Rules
Sort
View
AIIA
2005
Springer
15 years 3 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
DEBS
2008
ACM
15 years 3 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 1 months ago
Canonical calculi with (n,k)-ary quantifiers
Propositional canonical Gentzen-type systems, introduced in [2], are systems which in addition to the standard axioms and structural rules have only logical rules in which exactly ...
Arnon Avron, Anna Zamansky
PAMI
2006
95views more  PAMI 2006»
15 years 1 months ago
Table Detection in Online Ink Notes
In documents, tables are important structured objects that present statistical and relational information. In this paper, we present a robust system which is capable of detecting t...
Zhouchen Lin, Junfeng He, Zhicheng Zhong, Rongrong...
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
14 years 11 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...