Sciweavers

5344 search results - page 149 / 1069
» Privacy-Preserving Set Operations
Sort
View
113
Voted
DAGSTUHL
2008
15 years 4 months ago
Complete Interval Arithmetic and its Implementation
: Let IIR be the set of closed and bounded intervals of real numbers. Arithmetic in IIR can be defined via the power set IPIR of real numbers. If divisors containing zero are exclu...
Ulrich W. Kulisch
AAAI
2010
15 years 3 months ago
Inducing Probability Distributions from Knowledge Bases with (In)dependence Relations
When merging belief sets from different agents, the result is normally a consistent belief set in which the inconsistency between the original sources is not represented. As proba...
Jianbing Ma, Weiru Liu, Anthony Hunter
ICANN
2009
Springer
15 years 9 months ago
Logics and Networks for Human Reasoning
We propose to model human reasoning tasks using completed logic programs interpreted under the three-valued Lukasiewicz semantics. Given an appropriate immediate consequence operat...
Steffen Hölldobler, Carroline Dewi Puspa Kenc...
AIIA
2005
Springer
15 years 8 months ago
Human-Robot Interaction Through Mixed-Initiative Planning for Rescue and Search Rovers
Abstract. In this paper we present a mixed-initiative planning approach to humanrobot interaction in a rescue domain. We deploy a model-based executive monitoring system to coordin...
Alberto Finzi, Andrea Orlandini
CSMR
2003
IEEE
15 years 8 months ago
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter
In this paper we present a proposal for a novel approach to facilitating transparent interoperability among reverse engineering tools. We characterize the architectural and operat...
Dean Jin, James R. Cordy, Thomas R. Dean