Sciweavers

7167 search results - page 581 / 1434
» Answer Set Programming
Sort
View
149
Voted
AMW
2009
15 years 6 months ago
Checking Containment of Schema Mappings (Preliminary Report)
In data exchange, data are materialised from a source schema to a target schema, according to suitable source-to-target constraints. Constraints are also expressed on the target sc...
Andrea Calì, Riccardo Torlone
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 5 months ago
Quasi-randomness of graph balanced cut properties
Quasi-random graphs can be informally described as graphs whose edge distribution closely resembles that of a truly random graph of the same edge density. Recently, Shapira and Yu...
Hao Huang, Choongbum Lee
146
Voted
ECCC
2006
218views more  ECCC 2006»
15 years 5 months ago
Efficient Algorithms for Online Game Playing and Universal Portfolio Management
We introduce a new algorithm and a new analysis technique that is applicable to a variety of online optimization scenarios, including regret minimization for Lipschitz regret func...
Amit Agarwal, Elad Hazan
151
Voted
JAPLL
2008
121views more  JAPLL 2008»
15 years 5 months ago
Reasoning with prioritized information by iterative aggregation of distance functions
We introduce a general framework for reasoning with prioritized propositional data by aggregation of distance functions. Our formalism is based on a possible world semantics, wher...
Ofer Arieli
ENDM
2007
78views more  ENDM 2007»
15 years 5 months ago
The Interval Liar Game
We regard the problem of communication in the presence of faulty transmissions. In contrast to the classical works in this area, we assume some structure on the times when the faul...
Benjamin Doerr, Johannes Lengler, David Steurer