Sciweavers

1536 search results - page 114 / 308
» The Underlying Logic of Hoare Logic
Sort
View
NAACL
2001
14 years 11 months ago
Learning Optimal Dialogue Management Rules by Using Reinforcement Learning and Inductive Logic Programming
Developing dialogue systems is a complex process. In particular, designing efficient dialogue management strategies is often difficult as there are no precise guidelines to develo...
Renaud Lecoeuche
SIVP
2008
127views more  SIVP 2008»
14 years 10 months ago
Image indexing and retrieval using expressive fuzzy description logics
Abstract The effective management and exploitation of multimedia documents requires the extraction of the underlying semantics. Multimedia analysis algorithms can produce fairly ri...
Nikos Simou, Thanos Athanasiadis, Giorgos Stoilos,...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 11 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
KBSE
2005
IEEE
15 years 3 months ago
Properties and scopes in web model checking
We consider a formal framework for property verification of web applications using Spin model checker. Some of the web related properties concern all states of the model, while ot...
May Haydar, Sergiy Boroday, Alexandre Petrenko, Ho...
CL
2000
Springer
15 years 2 months ago
The Taming of the (X)OR
Abstract. Many key verification problems such as boundedmodel-checking,circuit verification and logical cryptanalysis are formalized with combined clausal and affine logic (i.e....
Peter Baumgartner, Fabio Massacci