Sciweavers

9425 search results - page 1743 / 1885
» Some Notes on Models and Modelling
Sort
View
FUIN
2007
130views more  FUIN 2007»
15 years 1 months ago
A Logic-Based Approach to Finding Explanations for Discrepancies in Optimistic Plan Execution
Abstract. Consider an agent executing a plan with nondeterministic actions, in a dynamic environment, which might fail. Suppose that she is given a description of this action domai...
Thomas Eiter, Esra Erdem, Wolfgang Faber, Já...
IIE
2007
125views more  IIE 2007»
15 years 1 months ago
Should LOGO Keep Going FORWARD 1?
LOGO has been evolving in incremental steps for 40 years. This has resulted in steady progress but some regions of the space of all programming languages for children cannot be re...
Ken Kahn
BMCBI
2005
98views more  BMCBI 2005»
15 years 1 months ago
InterferenceAnalyzer: Tools for the analysis and simulation of multi-locus genetic data
Background: Good statistical models for analyzing and simulating multilocus recombination data exist but are not accessible to many biologists because their use requires reasonabl...
Lalitha Viswanath, Elizabeth A. Housworth
152
Voted
CGF
2005
311views more  CGF 2005»
15 years 1 months ago
Cubical Marching Squares: Adaptive Feature Preserving Surface Extraction from Volume Data
In this paper, we present a new method for surface extraction from volume data which preserves sharp features, maintains consistent topology and generates surface adaptively witho...
Chien-Chang Ho, Fu-Che Wu, Bing-Yu Chen, Yung-Yu C...
148
Voted
JOC
2007
133views more  JOC 2007»
15 years 1 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
« Prev « First page 1743 / 1885 Last » Next »