School of Computer Science

Results: 3584



#Item
791

A Ground-Complete Axiomatization of Stateless Bisimilarity over LindaI Luca Acetoa,b,∗, Anna Ingolfsdottira , Eugen-Ioan Goriacc a ICE-TCS, School of Computer Science, Reykjavik University, Menntavegur 1, IS 101

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2014-05-16 11:34:01
    792

    In Proceedings of the Pacific Symposium on Biocomputing. ppJanINFERRING GENOTYPE FROM C LINICAL PHENOTYPE THROU GH A KNOWLEDGE BA SED A LGORITHM B.A. MALIN, L.A. SWEENEY, Ph.D. School of Computer Science,

    Add to Reading List

    Source URL: dataprivacylab.org

    Language: English - Date: 2013-10-01 06:57:47
      793

      Mathematical Features for Recognizing Preference in Sub-Saharan African Traditional Rhythm Timelines Godfried Toussaint? School of Computer Science McGill University

      Add to Reading List

      Source URL: cgm.cs.mcgill.ca

      Language: English - Date: 2005-09-23 11:33:46
        794

        A Faster Algorithm for Computing the Link Distance Between Two Point Sets on the Real Line Justin Colannino Godfried Toussaint School of Computer Science

        Add to Reading List

        Source URL: www-cgrl.cs.mcgill.ca

        Language: English - Date: 2005-09-09 13:51:22
          795

          Deciding ALBO with Tableau Renate A. Schmidt1 and Dmitry Tishkovsky1 School of Computer Science, The University of Manchester {renate.schmidt,dmitry.tishkovsky}@manchester.ac.uk This paper presents a tableau approach for

          Add to Reading List

          Source URL: sunsite.informatik.rwth-aachen.de

          Language: English - Date: 2007-05-22 01:39:22
            796

            New Privacy Issues in Mobile Telephony: Fix and Verification Myrto Arapinis, Loretta Mancini, Eike Ritter, Mark Ryan University of Birmingham School of Computer Science

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2012-08-14 14:27:13
              797

              Automatic verification of privacy properties in the applied pi calculus? St´ephanie Delaune1,2 , Mark Ryan1 , and Ben Smyth1 1 School of Computer Science, University of Birmingham, UK

              Add to Reading List

              Source URL: bensmyth.com

              Language: English - Date: 2012-08-05 11:53:58
                798

                An Implemented Context System that Combines Belief Reasoning, Metaphor-Based Reasoning and Uncertainty Handling John A. Barnden and Mark G. Lee School of Computer Science, The University of Birmingham Birmingham, B15 2TT

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2001-05-10 14:33:21
                  799

                  tion of parts,” Proc. IEEE Int. Conf. Robotics and Automation, Cincinnati, OH, USA, May 13-18, 1990, ppTe89] Teichman, M., Wedge Placement Optimization Problems, M.Sc. thesis, School of Computer Science.

                  Add to Reading List

                  Source URL: cgm.cs.mcgill.ca

                  Language: English - Date: 2002-06-03 20:47:46
                    800

                    The Robot Engineer Claude Sammut1, Raymond Sheh2, Adam Haber1,3, Hand Wicaksono1 1 School of Computer Science and Engineering, University of New South Wales, Sydney, Australia 2 Department

                    Add to Reading List

                    Source URL: www.ilp2015.jp

                    Language: English - Date: 2015-08-05 01:44:53
                      UPDATE