Sciweavers

2018 search results - page 180 / 404
» Code Normal Forms
Sort
View
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
13 years 5 months ago
Sampling minimal frequent boolean (DNF) patterns
We tackle the challenging problem of mining the simplest Boolean patterns from categorical datasets. Instead of complete enumeration, which is typically infeasible for this class ...
Geng Li, Mohammed J. Zaki
GAMEON
2000
15 years 4 months ago
RC++ A Rule Based Language for Game AI
"Game AI" is the high-level control code for computer entertainment applications. Games are diverse, and the nature of game AI reflects this diversity. However, game AI,...
Ian Wright, James A. R. Marshall
JCM
2007
95views more  JCM 2007»
15 years 2 months ago
Signal Canceller in the Carrier Super-positioning Satellite Networks
—To establish the interference canceller, generating replicas of unwanted carriers is a key. This paper addresses the design and performances of two types of signal canceller tha...
Mayumi Osato, Hiroyuki Kobashi, Robert Y. Omaki, T...
INFOCOM
2010
IEEE
15 years 1 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 9 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...