Sciweavers

1127 search results - page 80 / 226
» Theory Extension in ACL2(r)
Sort
View
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 6 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
103
Voted
ICDCSW
2006
IEEE
15 years 6 months ago
Multi-radio channel allocation in competitive wireless networks
Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio systems, bring this topic ...
Márk Félegyházi, Mario Cagalj...
ICIP
2005
IEEE
15 years 6 months ago
Using Tsallis entropy into a Bayesian network for CBIR
This paper presents a Bayesian Network model for ContentBased Image Retrieval (CBIR). In the explanation and test of this work, only two images features (semantic evidences) are i...
Paulo S. Rodrigues, Gilson A. Giraldi, Ade A. Arau...
110
Voted
ATAL
2005
Springer
15 years 6 months ago
Enforceable social laws
In this paper we study the enforcement of social laws in artificial social systems using a control system. We define the enforceable social law problem as an extension of Tennen...
Guido Boella, Leendert W. N. van der Torre
103
Voted
FROCOS
2005
Springer
15 years 6 months ago
A Comprehensive Framework for Combined Decision Procedures
We define a general notion of a fragment within higher order type theory; a procedure for constraint satisfiability in combined fragments is outlined, following Nelson-Oppen sche...
Silvio Ghilardi, Enrica Nicolini, Daniele Zucchell...