Sciweavers

3608 search results - page 193 / 722
» computer 2011
Sort
View
LPNMR
2011
Springer
14 years 6 months ago
What Are the Necessity Rules in Defeasible Reasoning?
This paper investigates a new approach for computing the inference of defeasible logic. The algorithm proposed can substantially reduced the theory size increase due to transformat...
Ho-Pun Lam, Guido Governatori
NAR
2011
298views Computer Vision» more  NAR 2011»
14 years 6 months ago
Indian genetic disease database
Indians, representing about one-sixth of the world population, consist of several thousands of endogamous groups with strong potential for excess of recessive diseases. However, n...
Sanchari Pradhan, Mainak Sengupta, Anirban Dutta, ...
ATVA
2011
Springer
295views Hardware» more  ATVA 2011»
14 years 4 months ago
Parallel Nested Depth-First Searches for LTL Model Checking
Even though the well-known nested-depth first search algorithm for LTL model checking provides good performance, it cannot benefit from the recent advent of multi-core computers....
Sami Evangelista, Laure Petrucci, Samir Youcef
150
Voted
COMGEO
2011
ACM
14 years 11 months ago
A note on the perimeter of fat objects
In this note, we show that the size of the perimeter of (α, β)-covered objects is a linear function of the diameter. Specifically, for an (α, β)-covered object O, per(O) ≤ c...
Prosenjit Bose, Otfried Cheong, Vida Dujmovic
IAJIT
2011
14 years 11 months ago
A constraint programming based approach to detect ontology inconsistencies
: This paper proposes a constraint programming based approach to handle ontologies consistency, and more precisely user-defined consistencies. In practice, ontologies consistency i...
Moussa Benaissa, Yahia Lebbah