• Nenhum resultado encontrado

[PDF] Top 20 Towards an information flow in logic programming

Has 10000 "Towards an information flow in logic programming" found on our website. Below are the top 20 most common "Towards an information flow in logic programming".

Towards an information flow in logic programming

Towards an information flow in logic programming

... fail. In this respect, we say information flows from x to y in G when there exists constants a, b such that G(a,y) succeeds whereas G(b,y) ...result, in this case, there is a flow of ... See full document

9

Machine Ethics via Logic Programming

Machine Ethics via Logic Programming

... camels in camel racing (Lewis, ...instance, an airplane’s automatic pilot should warrant that the plane arrive ...implementation. In Moor’s viewpoint, this is the level towards which the ... See full document

172

João Manuel Gomes Moura

João Manuel Gomes Moura

... provability logic of G¨odel formed the intuitionistic ...progress towards more justified belief systems has ...the Logic of Proofs (LoP) as a formalisation that internalizes justifications for ... See full document

224

A constraint logic programming approach to examination scheduling

A constraint logic programming approach to examination scheduling

... Constraint Logic Programming (CLP) generalises logic programming by replacing unification with constraint solving over a particular domain ...of logic programming with constraint ... See full document

7

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

... A programming tool, which is used to develop the prototype implementation of the proposed security ...language. An alternative option to produce SPARC assembly program directly is to use the option- S with ... See full document

9

Towards a Decentralized Information Systems Success Model

Towards a Decentralized Information Systems Success Model

... summarize in the following. Based on an analysis of GitHub project contribution data, (Pereira Junior et ...developer in a community are an important signal to other users. In addition ... See full document

18

Towards an Updatable Strategy Logic

Towards an Updatable Strategy Logic

... Strategy Logic (SL [8, 10]) is another interesting proposition, which distinguishes between the quan- tifications over strategies and their bindings to ...is an agent) that stores into a context the ... See full document

8

FUSION OF VENTURI AND ULTRASONIC FLOW METER FOR ENHANCED FLOW METER CHARACTERISTICS USING FUZZY LOGIC

FUSION OF VENTURI AND ULTRASONIC FLOW METER FOR ENHANCED FLOW METER CHARACTERISTICS USING FUZZY LOGIC

... related information from associated databases to achieve more specific inferences than could not be achieved by the use of single sensor [17 - ...attention in recent years for both military and non- ... See full document

6

Improving the information flow internal and external traceability in a slaughterhouse

Improving the information flow internal and external traceability in a slaughterhouse

... implement in such a large and automated way. There is evidence of its use in Japan pork ...as in the BC production, would need the change of the entire industry supply chain, starting with the farmer ... See full document

8

ENERGY EFFICIENT FLOW AND LEVEL CONTROL IN A HYDRO POWER PLANT USING FUZZY LOGIC

ENERGY EFFICIENT FLOW AND LEVEL CONTROL IN A HYDRO POWER PLANT USING FUZZY LOGIC

... and an innovative design of this work is to improve the energy efficiency by controlling the variables flow and level in a hydroelectric power plant using Programmable Logic Control ... See full document

9

Ethnicity and health

Ethnicity and health

... The Subcommittee on Planning and Programming is requested to examine this document and issue its observations on: a) the importance of gathering health information on ethnic groups; an[r] ... See full document

1

Human - Robot Coordination For Multi - Sized Humanoid Robot Using Wireless Communication

Human - Robot Coordination For Multi - Sized Humanoid Robot Using Wireless Communication

... working in hazardous situations such as defense, military and for those pursuing research, a robot based on replication technique capable of performing any task and which can be controlled via wireless link is ... See full document

6

Single Electron Transistor

Single Electron Transistor

... mechanical in an essential way. In fact, there is a close analogy between the confined electrons inside an SET and an ...atom. In this review, the physics underlying the ... See full document

7

Child Programming: An adequate Domain Specific Language for programming specific robots

Child Programming: An adequate Domain Specific Language for programming specific robots

... designs in several areas, commonly called cyber physical systems [1] (CPS) that combine both computer systems and electronic ...found in the Aerospace Industry, Telecommunications, Automotive, Chemi- cal, ... See full document

137

Application of Fuzzy Mathematical Approach for Cell Formation and Layout Design with Uncertain Condition

Application of Fuzzy Mathematical Approach for Cell Formation and Layout Design with Uncertain Condition

... values in such a way that a solution obtained under these values must be ...‘‘risk-free’’ towards ‘‘impossible’’ parameter values, is synonymous to moving from solutions with a high degree to solutions with ... See full document

6

Towards the generation of a database for scientific research in natural language processing with an information extraction system

Towards the generation of a database for scientific research in natural language processing with an information extraction system

... use Information Extraction, such as Conditional Random Fields, and/or Machine Learning techniques, such as Hidden Markov Models, to extract portions of papers important to tasks such as field-based search, author ... See full document

64

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

... done in the country and has also paved the way for economical, societal and cultural ...role in transforming India’s image to that of a global player in providing world-class technology solutions and ... See full document

6

Combining Open and Closed World Reasoning for the Semantic Web

Combining Open and Closed World Reasoning for the Semantic Web

... procedure in the first place to compute the model and store the results in a database which we then query on ...demand. In this chapter, we show that these conditions are indeed ...presented in ... See full document

243

ACO in e-Learning: Towards an adaptive learning path

ACO in e-Learning: Towards an adaptive learning path

... colonies. In the real world scenario the ants roam in search of food and upon finding out the sources they lay chemicals called pheromones on the ground through the way to food source and back to ...ants ... See full document

5

Model-Checking an Alternating-time Temporal Logic with Knowledge, Imperfect Information, Perfect Recall and Communicating Coalitions

Model-Checking an Alternating-time Temporal Logic with Knowledge, Imperfect Information, Perfect Recall and Communicating Coalitions

... timing information, such that the two agents need a strategy with perfect recall in order to reach their goal: after working tx time units both Alice and Bob must use their observable past to remember if ... See full document

15

Show all 10000 documents...