Sciweavers

631 search results - page 97 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
15 years 3 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
CATS
2007
15 years 3 months ago
Planning with Time Limits in BDI Agent Programming Languages
This paper provides a theoretical basis for performing time limited planning within Belief-Desire-Intention (BDI) agents. The BDI agent architecture is recognised as one of the mo...
Lavindra de Silva, Anthony Dekker, James Harland
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 3 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
DAGSTUHL
2008
15 years 3 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb
EMNLP
2008
15 years 3 months ago
Improving Chinese Semantic Role Classification with Hierarchical Feature Selection Strategy
In recent years, with the development of Chinese semantically annotated corpus, such as Chinese Proposition Bank and Normalization Bank, the Chinese semantic role labeling (SRL) t...
Weiwei Ding, Baobao Chang