Sciweavers

940 search results - page 132 / 188
» Rules and Strategies in Java
Sort
View
ICCS
2003
Springer
15 years 5 months ago
Automated Generation of Kinetic Chemical Mechanisms Using Rewriting
Several software systems have been developed recently for the automated generation of combustion reactions kinetic mechanisms using different representations of species and reacti...
Olivier Bournez, Guy-Marie Côme, Valé...
WOLLIC
2010
Springer
15 years 5 months ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...
101
Voted
VISUALIZATION
2002
IEEE
15 years 5 months ago
Compressing Polygon Mesh Geometry with Parallelogram Prediction
In this paper we present a generalization of the geometry coder by Touma and Gotsman [34] to polygon meshes. We let the polygon information dictate where to apply the parallelogra...
Martin Isenburg, Pierre Alliez
ECAL
2001
Springer
15 years 5 months ago
Evolution of Reinforcement Learning in Uncertain Environments: Emergence of Risk-Aversion and Matching
Reinforcement learning (RL) is a fundamental process by which organisms learn to achieve a goal from interactions with the environment. Using Artificial Life techniques we derive ...
Yael Niv, Daphna Joel, Isaac Meilijson, Eytan Rupp...
115
Voted
LOPSTR
2001
Springer
15 years 5 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle