Sciweavers

3116 search results - page 209 / 624
» Positively dependent types
Sort
View
148
Voted
DAGSTUHL
2001
15 years 6 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
IJCAI
2001
15 years 6 months ago
Constraints as Data: A New Perspective on Inferring Probabilities
We present a new approach to inferring a probability distribution which is incompletely specified by a number of linear constraints. We argue that the currently most popular appro...
Manfred Jaeger
NIPS
2003
15 years 6 months ago
Sparseness of Support Vector Machines---Some Asymptotically Sharp Bounds
The decision functions constructed by support vector machines (SVM’s) usually depend only on a subset of the training set—the so-called support vectors. We derive asymptotical...
Ingo Steinwart
ICMAS
1998
15 years 6 months ago
Determining Successful Negotiation Strategies: An Evolutionary Approach
To be successful in open, multi-agent environments, autonomous agents must be capable of adapting their negotiation strategies and tactics to their prevailing circumstances. To th...
Noyda Matos, Carles Sierra, Nicholas R. Jennings
116
Voted
ACS
2010
15 years 5 months ago
Essentiality and Injectivity
Essentiality is an important notion closely related to injectivity. Depending on a class M of morphisms of a category A, three different types of essentiality are considered in lit...
H. Barzegar, M. Mehdi Ebrahimi, Mojgan Mahmoudi