Sciweavers

2266 search results - page 378 / 454
» Evolutionary Algorithms for the Satisfiability Problem
Sort
View
CCS
2006
ACM
15 years 8 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
DAC
2008
ACM
16 years 5 months ago
Faster symmetry discovery using sparsity of symmetries
Many computational tools have recently begun to benefit from the use of the symmetry inherent in the tasks they solve, and use general-purpose graph symmetry tools to uncover this...
Paul T. Darga, Karem A. Sakallah, Igor L. Markov
CADE
2006
Springer
16 years 4 months ago
Inferring Network Invariants Automatically
Abstract. Verification by network invariants is a heuristic to solve uniform verification of parameterized systems. Given a system P, a network invariant for P is that abstracts th...
Olga Grinchtein, Martin Leucker, Nir Piterman
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 4 months ago
Ring-constrained join: deriving fair middleman locations from pointsets via a geometric constraint
We introduce a novel spatial join operator, the ring-constrained join (RCJ). Given two sets P and Q of spatial points, the result of RCJ consists of pairs p, q (where p P, q Q) ...
Man Lung Yiu, Panagiotis Karras, Nikos Mamoulis
ACSC
2007
IEEE
15 years 10 months ago
Web Services Discovery Based On Schema Matching
A web service is programmatically available application logic exposed over Internet. With the rapid development of e-commerce over Internet, web services have attracted much atten...
Yanan Hao, Yanchun Zhang