Sciweavers

4217 search results - page 698 / 844
» Computational indistinguishability logic
Sort
View
PPDP
2010
Springer
14 years 11 months ago
Graph queries through datalog optimizations
This paperdescribes the use of a powerful graph query language for querying programs, and a novel combination of transformations for generating efficient implementations of the q...
K. Tuncay Tekle, Michael Gorbovitski, Yanhong A. L...
129
Voted
EUSFLAT
2009
156views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference
One of the new trends in genetic fuzzy systems (GFS) is the use of evolutionary multiobjective optimization (EMO) algorithms. This is because EMO algorithms can easily handle two c...
Yusuke Nojima, Hisao Ishibuchi
97
Voted
ICCAD
2009
IEEE
132views Hardware» more  ICCAD 2009»
14 years 10 months ago
DynaTune: Circuit-level optimization for timing speculation considering dynamic path behavior
Traditional circuit design focuses on optimizing the static critical paths no matter how infrequently these paths are exercised dynamically. Circuit optimization is then tuned to ...
Lu Wan, Deming Chen
AI
2011
Springer
14 years 7 months ago
Approximation of action theories and its application to conformant planning
This paper describes our methodology for building conformant planners, which is based on recent advances in the theory of action and change and answer set programming. The develop...
Phan Huy Tu, Tran Cao Son, Michael Gelfond, A. Ric...
144
Voted
CODASPY
2011
14 years 4 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong