Sciweavers

2043 search results - page 364 / 409
» Reasoning About Security Models
Sort
View
EACL
2006
ACL Anthology
15 years 1 months ago
A Two-Stage Approach to Retrieving Answers for How-To Questions
This paper addresses the problem of automatically retrieving answers for how-to questions, focusing on those that inquire about the procedure for achieving a specific goal. For su...
Ling Yin
101
Voted
FORTE
2001
15 years 1 months ago
A Family of Resource-Bound Real-Time Process Algebras
The Algebra of Communicating Shared Resources (ACSR) is a timed process algebra which extends classical process algebras with the notion of a resource. It takes the view that the ...
Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Phi...
EON
2003
15 years 1 months ago
OntoTrack: Fast Browsing and Easy Editing of Large Ontologie
Abstract. OntoTrack is a new browsing and editing “in-one-view” ontology authoring tool. It combines a sophisticated graphical layout with mouse enabled editing features optimi...
Thorsten Liebig, Olaf Noppens
108
Voted
OPODIS
2004
15 years 1 months ago
A Constraint-Based Formalism for Consistency in Replicated Systems
Abstract. We present a formalism for modeling replication in a distributed system with concurrent users sharing information. It is based on actions, which represent operations requ...
Marc Shapiro, Karthikeyan Bhargavan, Nishith Krish...
115
Voted
AAAI
1997
15 years 1 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand