Sciweavers

1862 search results - page 125 / 373
» Constrained pattern matching
Sort
View
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 10 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
PLILP
1998
Springer
15 years 5 months ago
A Compiler for Rewrite Programs in Associative-Commutative Theories
Abstract. We address the problem of term normalisation modulo associativecommutative (AC) theories, and describe several techniques for compiling many-to-one AC matching and reduce...
Pierre-Etienne Moreau, Hélène Kirchn...
NIPS
2001
15 years 2 months ago
Modeling Temporal Structure in Classical Conditioning
The Temporal Coding Hypothesis of Miller and colleagues [7] suggests that animals integrate related temporal patterns of stimuli into single memory representations. We formalize t...
Aaron C. Courville, David S. Touretzky
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
14 years 10 months ago
A graph-theoretic approach to distributed control over networks
We consider a network of control systems connected over a graph. Considering the graph structure as constraints on the set of permissible controllers, we show that such systems ar...
John Swigart, Sanjay Lall
JIIS
2011
99views more  JIIS 2011»
14 years 7 months ago
Mining transposed motifs in music
The discovery of frequent musical patterns (motifs) is a relevant problem in musicology. This paper introduces an unsupervised algorithm to address this problem in symbolically-rep...
Aída Jiménez, Miguel Molina-Solana, ...