Sciweavers

1700 search results - page 279 / 340
» Combinatorial Pattern Matching
Sort
View
103
Voted
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 7 months ago
An Almost Optimal Rank Bound for Depth-3 Identities
—We show that the rank of a depth-3 circuit (over any field) that is simple, minimal and zero is at most O(k3 log d). The previous best rank bound known was 2O(k2 ) (log d)k−2...
Nitin Saxena, C. Seshadhri
119
Voted
SPIN
2009
Springer
15 years 7 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
HT
2009
ACM
15 years 7 months ago
On hypertext narrative
Annals and chronicles may be the foundation of accounting, but writers of stories and histories have long known that they seldom render a satisfactory account of complex events. I...
Mark Bernstein
98
Voted
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 7 months ago
Integration Testing of Composite Applications
A service-oriented architecture enables composite applications that support business processes to be defined and built dynamically from loosely coupled and interoperable web servi...
Liam Peyton, Bernard Stepien, Pierre Seguin
117
Voted
IJCNN
2008
IEEE
15 years 7 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn