• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,585
Next 10 →

On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games

by Phan Minh Dung - Artificial Intelligence , 1995
"... The purpose of this paper is to study the fundamental mechanism humans use in argumentation and its role in different major approaches to commonsense reasoning in AI and logic programming. We present three novel results: We develop a theory for argumentation in which the acceptability of arguments i ..."
Abstract - Cited by 1198 (12 self) - Add to MetaCart
is precisely defined. We show that logic programming and nonmonotonic reasoning in AI are different forms of argumentation. We show that argumentation can be viewed as a special form of logic programming with negation as failure. This result introduces a general method for generating metainterpreters

A Roadmap of Agent Research and Development

by Nicholas R. Jennings, Katia Sycara, Michael Wooldridge - INT JOURNAL OF AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS , 1998
"... This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications, and to indicate how they relate to one-another. Some historical context to the field of agent-based computing is give ..."
Abstract - Cited by 511 (8 self) - Add to MetaCart
This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications, and to indicate how they relate to one-another. Some historical context to the field of agent-based computing

Data Integration: A Theoretical Perspective

by Maurizio Lenzerini - Symposium on Principles of Database Systems , 2002
"... Data integration is the problem of combining data residing at different sources, and providing the user with a unified view of these data. The problem of designing data integration systems is important in current real world applications, and is characterized by a number of issues that are interestin ..."
Abstract - Cited by 965 (45 self) - Add to MetaCart
Data integration is the problem of combining data residing at different sources, and providing the user with a unified view of these data. The problem of designing data integration systems is important in current real world applications, and is characterized by a number of issues

Query evaluation techniques for large databases

by Goetz Graefe - ACM COMPUTING SURVEYS , 1993
"... Database management systems will continue to manage large data volumes. Thus, efficient algorithms for accessing and manipulating large sets and sequences will be required to provide acceptable performance. The advent of object-oriented and extensible database systems will not solve this problem. On ..."
Abstract - Cited by 767 (11 self) - Add to MetaCart
. On the contrary, modern data models exacerbate it: In order to manipulate large sets of complex objects as efficiently as today’s database systems manipulate simple records, query processing algorithms and software will become more complex, and a solid understanding of algorithm and architectural issues

Model Checking Programs

by Willem Visser, Klaus Havelund, GUILLAUME BRAT, SEUNGJOON PARK, FLAVIO LERDA , 2003
"... The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. In this pape ..."
Abstract - Cited by 592 (63 self) - Add to MetaCart
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers

Charging and rate control for elastic traffic

by Frank Kelly - European Transactions on Telecommunications , 1997
"... This paper addresses the issues of charging, rate control and routing for a communication network carrying elastic traffic, such as an ATM network offering an available bit rate service. A model is described from which max–min fairness of rates emerges as a limiting special case; more generally, the ..."
Abstract - Cited by 936 (7 self) - Add to MetaCart
This paper addresses the issues of charging, rate control and routing for a communication network carrying elastic traffic, such as an ATM network offering an available bit rate service. A model is described from which max–min fairness of rates emerges as a limiting special case; more generally

The synchronous approach to reactive and real-time systems

by Albert Benveniste, Gerard Berry - Proceedings of the IEEE , 1991
"... This special issue is devoted to the synchronous approach to reactive and real-time programming. This introductory paper presents and discusses the application fields and the principles of synchronous programming. The major concern of the synchronous approach is to base synchronous programming langu ..."
Abstract - Cited by 436 (15 self) - Add to MetaCart
This special issue is devoted to the synchronous approach to reactive and real-time programming. This introductory paper presents and discusses the application fields and the principles of synchronous programming. The major concern of the synchronous approach is to base synchronous programming

The Challenges of Mobile Computing

by George H. Forman, John Zahorjan - IEEE Computer , 1994
"... this article we focus on the issues pertinent to software designers without delving into the lower level details of the hardware realization of mobile computers. We look at some promising approaches under investigation and also consider their limitations. The many issues to be dealt with stem from t ..."
Abstract - Cited by 448 (1 self) - Add to MetaCart
three essential properties of mobile computing: communication, mobility, and portability. Of course, special-purpose systems may avoid some design pressures by doing without certain desirable properties. For instance, portability would be less of a concern for mobile computers installed

Argument and multi-agent systems

by Timothy J. Norman, Daniela V. Carbogim, Erik C. W. Krabbe, Douglas N. Walton - ARGUMENTATION MACHINES , 2004
"... Recent work in argumentation theory and informal (practical) logic has developed certain tools that seem to be useful and applicable to multi-agent systems in which participants need to interact. Multiple interacting agents that engage in persuasive dialogue, negotiation and the construction of join ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
of joint plans of action have the potential to provide argumentation theory with a means to implement and evaluate their theories. In this chapter we address the issues that are of interest to argumentation and multi-agent systems, similarities between these interests, open problems on both sides

Developing Multiagent Systems: The Gaia Methodology

by Franco Zambonelli, Nicholas R. Jennings, Michael Wooldridge , 2003
"... Systems composed of interacting autonomous agents offer a promising software engineering approach for developing applications in complex domains. However, this multiagent system paradigm introduces a number of new abstractions and design/development issues when compared with more traditional appr ..."
Abstract - Cited by 389 (18 self) - Add to MetaCart
Systems composed of interacting autonomous agents offer a promising software engineering approach for developing applications in complex domains. However, this multiagent system paradigm introduces a number of new abstractions and design/development issues when compared with more traditional
Next 10 →
Results 1 - 10 of 10,585
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University