Sciweavers

1061 search results - page 159 / 213
» A general definition of malware
Sort
View
SIAMCOMP
2008
100views more  SIAMCOMP 2008»
14 years 11 months ago
On the Complexity of Verifying Consistency of XML Specifications
XML specifications often consist of a type definition (typically, a DTD) and a set of integrity constraints. It has been shown previously that such specifications can be inconsiste...
Marcelo Arenas, Wenfei Fan, Leonid Libkin
PRL
2006
121views more  PRL 2006»
14 years 11 months ago
Information-preserving hybrid data reduction based on fuzzy-rough techniques
Data reduction plays an important role in machine learning and pattern recognition with a high-dimensional data. In real-world applications data usually exists with hybrid formats...
Qinghua Hu, Daren Yu, Zongxia Xie
AES
2005
Springer
105views Cryptology» more  AES 2005»
14 years 11 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
APIN
2005
127views more  APIN 2005»
14 years 11 months ago
Evolutionary Radial Basis Functions for Credit Assessment
Credit analysts generally assess the risk of credit applications based on their previous experience. They frequently employ quantitative methods to this end. Among the methods used...
Estefane G. M. de Lacerda, André Carlos Pon...
WS
2008
ACM
14 years 11 months ago
OWL 2: The next step for OWL
Since achieving W3C recommendation status in 2004, the Web Ontology Language (OWL) has been successfully applied to many problems in computer science. Practical experience with OW...
Bernardo Cuenca Grau, Ian Horrocks, Boris Motik, B...