Sciweavers

1192 search results - page 183 / 239
» Computing Weakest Readings
Sort
View
TREC
2007
15 years 3 months ago
Exegy at TREC 2007 Million Query Track
Exegy’s submission for the TREC 2007 million query track consisted of results obtained by running the queries against the raw data, i.e., the data was not indexed. The hardwarea...
Naveen Singla, Ronald S. Indeck
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 2 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 2 months ago
Offloading Cognition onto Cognitive Technology
: "Cognizing" (i.e., thinking, understanding, knowing, and having the capacity to do what cognizers can do) is a mental state. Systems without mental states, such as cogn...
Itiel E. Dror, Stevan Harnad
ENTCS
2006
138views more  ENTCS 2006»
15 years 2 months ago
Propositional Games with Explicit Strategies
This paper presents a game semantics for LP, Artemov's Logic of Proofs. The language of LP extends that of propositional logic by adding formula-labeling terms, permitting us...
Bryan Renne
JEC
2006
71views more  JEC 2006»
15 years 1 months ago
Destructive-read in embedded DRAM, impact on power consumption
This paper explores power consumption for destructive-read embedded DRAM. Destructive-read DRAM is based on conventional DRAM design, but with sense amplifiers optimized for lower ...
Haakon Dybdahl, Per Gunnar Kjeldsberg, Marius Gran...