Sciweavers

2157 search results - page 321 / 432
» Binary ant algorithm
Sort
View
139
Voted
WEBDB
2009
Springer
115views Database» more  WEBDB 2009»
15 years 11 months ago
A Machine Learning Approach to Foreign Key Discovery
We study the problem of automatically discovering semantic associations between schema elements, namely foreign keys. This problem is important in all applications where data sets...
Alexandra Rostin, Oliver Albrecht, Jana Bauckmann,...
ICPR
2008
IEEE
15 years 11 months ago
The structure analysis of ultra thin magnetic film images
Algorithm of magnetic structure extraction and analysis in ultra thin magnetic film images is proposed. This algorithm allows to gain successful results and calculates a large num...
Alexandr Nedzved, Sergey Ablameyko, Alexei Belotse...
COMSWARE
2007
IEEE
15 years 11 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
FOCS
2007
IEEE
15 years 11 months ago
Can you beat treewidth?
: It is well-known that constraint satisfaction problems (CSP) over an unbounded domain can be solved in time nO(k) if the treewidth of the primal graph of the instance is at most ...
Dániel Marx
ATVA
2007
Springer
136views Hardware» more  ATVA 2007»
15 years 11 months ago
Symbolic Fault Tree Analysis for Reactive Systems
Fault tree analysis is a traditional and well-established technique for analyzing system design and robustness. Its purpose is to identify sets of basic events, called cut sets, wh...
Marco Bozzano, Alessandro Cimatti, Francesco Tappa...