Sfoglia per Serie LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
A R/S approach to Trends Breaks Detection
2005-01-01 Resta, Marina
Ranking and Reputation Systems in the QBF Competition
2007-01-01 Narizzano, Massimo; Pulina, Luca; Tacchella, Armando
Rational Normal Curves as Set-Theoretic Complete Intersections of Quadrics
2015-01-01 Torrente, MARIA LAURA
Reasoning About Agents' Interaction Protocols Inside DCaseLP
2004-01-01 M., Baldoni; C., Baroglio; I., Gungui; A., Martelli; Martelli, Maurizio; Mascardi, Viviana; V., Patti; C., Schifanella
A Reduction-Based Approach for Solving Disjunctive Temporal Problems with Preferences
2013-01-01 Bourguet, Jean Rémi; Maratea, Marco; Pulina, Luca
Reference monitors for security and interoperability in OAuth 2.0
2014-01-01 Cherrueau, R. -A.; Douence, R.; Royer, J. -C.; Sudholt, M.; De Oliveira, A. S.; Roudier, Y.; Dell'Amico, M.
ReForeSt: Random forests in apache spark
2017-01-01 Lulli, A.; Oneto, L.; Anguita, D.
Relations in ontology-driven conceptual modeling
2019-01-01 Fonseca, C. M.; Porello, D.; Guizzardi, G.; Almeida, J. P. A.; Guarino, N.
Repairing Learned Controllers with Convex Optimization: A Case Study
2019-01-01 Guidotti, Dario; Leofante, F.; Castellini, C.; Tacchella, A.
Repairing Socially Aggregated Ontologies Using Axiom Weakening
2017-01-01 Porello, D.; Troquard, N.; Confalonieri, R.; Galliani, P.; Kutz, O.; Penaloza, R.
Reverse Engineering of Middleware for Verification of Robot Control Architectures
2014-01-01 Khalili, Ali; Natale, Lorenzo; Tacchella, Armando
Reverting the Effects of XQuery Update Expressions
2011-01-01 F., Cavalieri; Guerrini, Giovanna; M., Mesiti
Risk-based privacy-aware access control for threat detection systems
2017-01-01 Metoui, Nadia; Bezzi, Michele; Armando, Alessandro
A Robust Method for Statistical Testing of Empirical Power-Law Distributions
2020-01-01 Garbarino, Davide; Tozzo, Veronica; Vian, Andrea; Barla, Annalisa
ROSMonitoring: A Runtime Verification Framework for ROS
2020-01-01 Ferrando, A.; Cardoso, R. C.; Fisher, M.; Ancona, D.; Franceschini, L.; Mascardi, V.
Runtime Verification with Imperfect Information Through Indistinguishability Relations
2022-01-01 Ferrando, A.; Malvone, V.
Safe Learning with Real-Time Constraints: A Case Study
2010-01-01 Metta, Giorgio; Natale, Lorenzo; Pathak, Shashank; Pulina, Luca; Tacchella, Armando
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints
2005-01-01 Armando, Alessandro; Castellini, Claudio; Giunchiglia, Enrico; Maratea, Marco
SAT-Based Planning with Minimal-#actions Plans and "soft" Goals
2007-01-01 Giunchiglia, Enrico; Maratea, Marco
SC2: Satisfiability checking meets symbolic computation (Project Paper)
2016-01-01 Abraham, Erika; Abbott, JOHN ANTHONY; Becker, Bernd; Bigatti, ANNA MARIA; Brain, Martin; Buchberger, Bruno; Cimatti, Alessandro; Davenport, James H.; England, Matthew; Fontaine, Pascal; Forrest, Stephen; Griggio, Alberto; Kroening, Daniel; Seiler, Werner M.; Sturm, Thomas
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A R/S approach to Trends Breaks Detection | 1-gen-2005 | Resta, Marina | |
Ranking and Reputation Systems in the QBF Competition | 1-gen-2007 | Narizzano, Massimo; Pulina, Luca; Tacchella, Armando | |
Rational Normal Curves as Set-Theoretic Complete Intersections of Quadrics | 1-gen-2015 | Torrente, MARIA LAURA | |
Reasoning About Agents' Interaction Protocols Inside DCaseLP | 1-gen-2004 | M., Baldoni; C., Baroglio; I., Gungui; A., Martelli; Martelli, Maurizio; Mascardi, Viviana; V., Patti; C., Schifanella | |
A Reduction-Based Approach for Solving Disjunctive Temporal Problems with Preferences | 1-gen-2013 | Bourguet, Jean Rémi; Maratea, Marco; Pulina, Luca | |
Reference monitors for security and interoperability in OAuth 2.0 | 1-gen-2014 | Cherrueau, R. -A.; Douence, R.; Royer, J. -C.; Sudholt, M.; De Oliveira, A. S.; Roudier, Y.; Dell'Amico, M. | |
ReForeSt: Random forests in apache spark | 1-gen-2017 | Lulli, A.; Oneto, L.; Anguita, D. | |
Relations in ontology-driven conceptual modeling | 1-gen-2019 | Fonseca, C. M.; Porello, D.; Guizzardi, G.; Almeida, J. P. A.; Guarino, N. | |
Repairing Learned Controllers with Convex Optimization: A Case Study | 1-gen-2019 | Guidotti, Dario; Leofante, F.; Castellini, C.; Tacchella, A. | |
Repairing Socially Aggregated Ontologies Using Axiom Weakening | 1-gen-2017 | Porello, D.; Troquard, N.; Confalonieri, R.; Galliani, P.; Kutz, O.; Penaloza, R. | |
Reverse Engineering of Middleware for Verification of Robot Control Architectures | 1-gen-2014 | Khalili, Ali; Natale, Lorenzo; Tacchella, Armando | |
Reverting the Effects of XQuery Update Expressions | 1-gen-2011 | F., Cavalieri; Guerrini, Giovanna; M., Mesiti | |
Risk-based privacy-aware access control for threat detection systems | 1-gen-2017 | Metoui, Nadia; Bezzi, Michele; Armando, Alessandro | |
A Robust Method for Statistical Testing of Empirical Power-Law Distributions | 1-gen-2020 | Garbarino, Davide; Tozzo, Veronica; Vian, Andrea; Barla, Annalisa | |
ROSMonitoring: A Runtime Verification Framework for ROS | 1-gen-2020 | Ferrando, A.; Cardoso, R. C.; Fisher, M.; Ancona, D.; Franceschini, L.; Mascardi, V. | |
Runtime Verification with Imperfect Information Through Indistinguishability Relations | 1-gen-2022 | Ferrando, A.; Malvone, V. | |
Safe Learning with Real-Time Constraints: A Case Study | 1-gen-2010 | Metta, Giorgio; Natale, Lorenzo; Pathak, Shashank; Pulina, Luca; Tacchella, Armando | |
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints | 1-gen-2005 | Armando, Alessandro; Castellini, Claudio; Giunchiglia, Enrico; Maratea, Marco | |
SAT-Based Planning with Minimal-#actions Plans and "soft" Goals | 1-gen-2007 | Giunchiglia, Enrico; Maratea, Marco | |
SC2: Satisfiability checking meets symbolic computation (Project Paper) | 1-gen-2016 | Abraham, Erika; Abbott, JOHN ANTHONY; Becker, Bernd; Bigatti, ANNA MARIA; Brain, Martin; Buchberger, Bruno; Cimatti, Alessandro; Davenport, James H.; England, Matthew; Fontaine, Pascal; Forrest, Stephen; Griggio, Alberto; Kroening, Daniel; Seiler, Werner M.; Sturm, Thomas |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile