Sciweavers

46 search results - page 3 / 10
» Extracting MUCs from Constraint Networks
Sort
View
AAAI
1990
13 years 6 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
JCP
2007
100views more  JCP 2007»
13 years 5 months ago
Extraction of Unique Independent Components for Nonlinear Mixture of Sources
—In this paper, a neural network solution to extract independent components from nonlinearly mixed signals is proposed. Firstly, a structurally constrained mixing model is introd...
Pei Gao, Li Chin Khor, Wai Lok Woo, Satnam Singh D...
GIS
2007
ACM
13 years 9 months ago
Optimal traversal planning in road networks with navigational constraints
A frequent query in geospatial planning and decision making domains (e.g., emergency response, data acquisition, street cleaning), is to find an optimal traversal plan (OTP) that ...
Leyla Kazemi, Cyrus Shahabi, Mehdi Sharifzadeh, Lu...
MOBIHOC
2005
ACM
14 years 5 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
CCS
2003
ACM
13 years 10 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu