Sciweavers

2043 search results - page 407 / 409
» Reasoning About Security Models
Sort
View
IJCAI
2003
15 years 3 months ago
Writer's Aid: Using a Planner in a Collaborative Interface
Writer’s Aid is a collaborative system that works simultaneously with an author editing a document providing assistance in identifying and inserting citation keys and autonomous...
Tamara Babaian, Barbara J. Grosz, Stuart M. Shiebe...
108
Voted
AAAI
1994
15 years 3 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
BMCBI
2010
135views more  BMCBI 2010»
15 years 1 months ago
GIGA: a simple, efficient algorithm for gene tree inference in the genomic age
Background: Phylogenetic relationships between genes are not only of theoretical interest: they enable us to learn about human genes through the experimental work on their relativ...
Paul D. Thomas
152
Voted
DCG
2008
118views more  DCG 2008»
15 years 1 months ago
General-Dimensional Constrained Delaunay and Constrained Regular Triangulations, I: Combinatorial Properties
Two-dimensional constrained Delaunay triangulations are geometric structures that are popular for interpolation and mesh generation because they respect the shapes of planar domai...
Jonathan Richard Shewchuk
AIM
2006
15 years 1 months ago
Comparative Analysis of Frameworks for Knowledge-Intensive Intelligent Agents
maintain awareness of its environment for a long period of time. Additionally, knowledge-intensive agents must be engineered such that their knowledge can be easily updated as envi...
Randolph M. Jones, Robert E. Wray III