Sciweavers

8196 search results - page 1444 / 1640
» Computational Modeling and Complexity Science
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 8 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
MFPS
1989
15 years 8 months ago
Operations on Records
We define a simple collection of operations for creating and manipulating record structures, where records are intended as finite associations of values to labels. A second-order ...
Luca Cardelli, John C. Mitchell
EDBT
2000
ACM
15 years 7 months ago
Temporal View Self-Maintenance
Warehouse view self-maintenance refers to maintaining materialized views at a data warehouse without accessing source data. Self-maintenance has been studied for nontemporal views...
Jun Yang 0001, Jennifer Widom
CCS
2008
ACM
15 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
156
Voted
BMCBI
2006
114views more  BMCBI 2006»
15 years 4 months ago
Epigenetic acquisition of inducibility of type III cytotoxicity in P. aeruginosa
Background: Pseudomonas aeruginosa, an opportunistic pathogen, is often encountered in chronic lung diseases such as cystic fibrosis or chronic obstructive pneumonia, as well as a...
Didier Filopon, Annabelle Mérieau, Gilles B...
« Prev « First page 1444 / 1640 Last » Next »