Sciweavers

977 search results - page 45 / 196
» Soft Constraints for Security
Sort
View
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
14 years 9 months ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings
EUSFLAT
2007
14 years 11 months ago
Using Generalized Constraints and Protoforms to Deal with Adverbs
Computation with information described in natural language (NL) has intrinsic importance because much of human knowledge is described using these languages. Soft Computing approac...
Andrés Soto, José Angel Olivas, Manu...
VRIPHYS
2010
14 years 4 months ago
Interactive Deformations with Multigrid Skeletal Constraints
In this paper we present an interactive method for simulating deformable objects using skeletal constraints. We introduce a two-way coupling of a finite element model and a skelet...
Joachim Georgii, Daniel Lagler, Christian Dick, R&...
KR
2010
Springer
15 years 2 months ago
Finding the Next Solution in Constraint- and Preference-Based Knowledge Representation Formalisms
In constraint or preference reasoning, a typical task is to compute a solution, or an optimal solution. However, when one has already a solution, it may be important to produce th...
Ronen I. Brafman, Francesca Rossi, Domenico Salvag...
CVPR
2012
IEEE
13 years 11 days ago
Multiclass pixel labeling with non-local matching constraints
A popular approach to pixel labeling problems, such as multiclass image segmentation, is to construct a pairwise conditional Markov random field (CRF) over image pixels where the...
Stephen Gould