Sciweavers

2043 search results - page 289 / 409
» Reasoning About Security Models
Sort
View
SIGMOD
1998
ACM
115views Database» more  SIGMOD 1998»
15 years 5 months ago
Providing Database-like Access to the Web Using Queries Based on Textual Similarity
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
122
Voted
IAT
2009
IEEE
15 years 4 months ago
Confusion and Distance Metrics as Performance Criteria for Hierarchical Classification Spaces
When intelligent systems reason about complex problems with a large hierarchical classification space it is hard to evaluate system performance. For classification problems, differ...
Wilbert van Norden, Catholijn M. Jonker
CCIA
2006
Springer
15 years 4 months ago
Extending the BDI architecture with commitments
Abstract. In this paper, we describe a novel agent architecture for normative multiagent systems which is based on multi-context systems. It models the three modalities of Rao and ...
Dorian Gaertner, Pablo Noriega, Carles Sierra
ACSD
2001
IEEE
134views Hardware» more  ACSD 2001»
15 years 4 months ago
Embedding Imperative Synchronous Languages in Interactive Theorem Provers
We present a new way to define the semantics of imperative synchronous languages by means of separating the control and the data flow. The control flow is defined by predicates th...
Klaus Schneider
106
Voted
ESOP
2000
Springer
15 years 4 months ago
A Kleene Analysis of Mobile Ambients
Abstract. We show how a program analysis technique originally developed for C-like pointer structures can be adapted to analyse the hierarchical structure of processes in the ambie...
Flemming Nielson, Hanne Riis Nielson, Shmuel Sagiv