Sciweavers

759 search results - page 32 / 152
» Verification of a Microprocessor Using Real World Applicatio...
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
KI
1998
Springer
15 years 1 months ago
GOLEX - Bridging the Gap between Logic (GOLOG) and a Real Robot
The control of mobile robots acting autonomously in the real world is one of the long-term goals of the field of artificial intelligence. So far the field lacks methods bridging th...
Dirk Hähnel, Wolfram Burgard, Gerhard Lakemey...
JCIT
2008
94views more  JCIT 2008»
14 years 9 months ago
Finding Semantic Errors in the Rule-base of Production Systems, and Reasoning with Insufficient Input Data Petri-net-based Appro
Two simple but practical production systems are modeled using Petri Nets. Petri-net models are very useful in finding semantic errors like generalization error and missing conditi...
Hong-Youl Lee
ICIP
2009
IEEE
15 years 10 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
TVCG
2010
176views more  TVCG 2010»
14 years 8 months ago
Evaluation of the Cognitive Effects of Travel Technique in Complex Real and Virtual Environments
—We report a series of experiments conducted to investigate the effects of travel technique on information gathering and cognition in complex virtual environments. In the first e...
Evan A. Suma, Samantha L. Finkelstein, Myra Reid, ...