Sciweavers

1486 search results - page 190 / 298
» Algorithms for two-box covering
Sort
View
ARCS
2006
Springer
15 years 8 months ago
Safety, Liveness, and Information Flow: Dependability Revisited
Abstract: We present a formal framework to talk and reason about dependable systems. The framework is based on three distinct classes of (system specification) properties we call s...
Zinaida Benenson, Felix C. Freiling, Thorsten Holz...
COOPIS
2004
IEEE
15 years 8 months ago
Aligning Ontologies and Evaluating Concept Similarities
An innate characteristic of the development of ontologies is that they are often created by independent groups of expertise, which generates the necessity of merging and aligning o...
Kleber Xavier Sampaio de Souza, Joseph Davis
ECAI
2004
Springer
15 years 8 months ago
Instance-Based Prediction with Guaranteed Confidence
Instance-based learning (IBL) algorithms have proved to be successful in many applications. However, as opposed to standard statistical methods, a prediction in IBL is usually give...
Eyke Hüllermeier
DEEC
2006
IEEE
15 years 8 months ago
A Bottom-Up Workflow Mining Approach for Workflow Applications Analysis
Abstract. Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interac...
Walid Gaaloul, Karim Baïna, Claude Godart
DAC
1995
ACM
15 years 8 months ago
Register Allocation and Binding for Low Power
This paper describes a technique for calculating the switching activity of a set of registers shared by di erent data values. Based on the assumption that the joint pdf (probabili...
Jui-Ming Chang, Massoud Pedram