Sciweavers

1862 search results - page 311 / 373
» Constrained pattern matching
Sort
View
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 6 months ago
An Almost Optimal Rank Bound for Depth-3 Identities
—We show that the rank of a depth-3 circuit (over any field) that is simple, minimal and zero is at most O(k3 log d). The previous best rank bound known was 2O(k2 ) (log d)k−2...
Nitin Saxena, C. Seshadhri
CPM
2009
Springer
189views Combinatorics» more  CPM 2009»
15 years 6 months ago
Average-Case Analysis of Perfect Sorting by Reversals
A sequence of reversals that takes a signed permutation to the identity is perfect if it preserves all common intervals between the permutation and the identity. The problem of com...
Mathilde Bouvel, Cedric Chauve, Marni Mishna, Domi...
SPIN
2009
Springer
15 years 6 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
HT
2009
ACM
15 years 6 months ago
On hypertext narrative
Annals and chronicles may be the foundation of accounting, but writers of stories and histories have long known that they seldom render a satisfactory account of complex events. I...
Mark Bernstein
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 6 months ago
Integration Testing of Composite Applications
A service-oriented architecture enables composite applications that support business processes to be defined and built dynamically from loosely coupled and interoperable web servi...
Liam Peyton, Bernard Stepien, Pierre Seguin