Sciweavers

3555 search results - page 521 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECAI
2006
Springer
15 years 7 months ago
A Solver for QBFs in Nonprenex Form
Various problems in AI can be solved by translating them into a quantified boolean formula (QBF) and evaluating the resulting encoding. In this approach, a QBF solver is used as a ...
Uwe Egly, Martina Seidl, Stefan Woltran
ECAI
2008
Springer
15 years 6 months ago
Fighting Knowledge Acquisition Bottleneck with Argument Based Machine Learning
Knowledge elicitation is known to be a difficult task and thus a major bottleneck in building a knowledge base. Machine learning has long ago been proposed as a way to alleviate th...
Martin Mozina, Matej Guid, Jana Krivec, Aleksander...
ATAL
2009
Springer
15 years 5 months ago
Directed Deadline Obligations in Agent-Based Business Contracts
There are B2B relationships that presume cooperation in contract enactment. This issue should be taken into account when modeling, for computational handling, contractual commitmen...
Henrique Lopes Cardoso, Eugénio C. Oliveira
142
Voted
JSAC
2006
153views more  JSAC 2006»
15 years 4 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...
RTS
2006
129views more  RTS 2006»
15 years 4 months ago
Modeling out-of-order processors for WCET analysis
Estimating the Worst Case Execution Time (WCET) of a program on a given processor is important for the schedulability analysis of real-time systems. WCET analysis techniques typic...
Xianfeng Li, Abhik Roychoudhury, Tulika Mitra