Sciweavers

9405 search results - page 134 / 1881
» Computing a Model of Set Theory
Sort
View
PODS
2006
ACM
134views Database» more  PODS 2006»
15 years 10 months ago
Finding global icebergs over distributed data sets
Finding icebergs ? items whose frequency of occurrence is above a certain threshold ? is an important problem with a wide range of applications. Most of the existing work focuses ...
Qi Zhao, Mitsunori Ogihara, Haixun Wang, Jun Xu
DBPL
2001
Springer
133views Database» more  DBPL 2001»
15 years 2 months ago
A Theory of Spatio-Temporal Database Queries
Abstract. We address a fundamental question concerning spatio-temporal database systems: “What are exactly spatio-temporal queries?” We define spatio-temporal queries to be co...
Floris Geerts, Sofie Haesevoets, Bart Kuijpers
DEBS
2007
ACM
15 years 2 months ago
Towards a theory of events
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...
K. Mani Chandy, Michel Charpentier, Agostino Cappo...
87
Voted
PARA
2004
Springer
15 years 3 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...
CSFW
2007
IEEE
15 years 4 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...