Sciweavers

2905 search results - page 306 / 581
» Formal Memetic Algorithms
Sort
View
CAV
2009
Springer
176views Hardware» more  CAV 2009»
16 years 1 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
EWSN
2009
Springer
16 years 1 months ago
Cooperative Intrusion Detection in Wireless Sensor Networks
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 1 months ago
Constraint programming for itemset mining
The relationship between constraint-based mining and constraint programming is explored by showing how the typical constraints used in pattern mining can be formulated for use in ...
Luc De Raedt, Tias Guns, Siegfried Nijssen
POPL
2006
ACM
16 years 1 months ago
Staged allocation: a compositional technique for specifying and implementing procedure calling conventions
We present staged allocation, a technique for specifying calling conventions by composing tiny allocators called stages. A specification written using staged allocation has a prec...
Reuben Olinsky, Christian Lindig, Norman Ramsey
SIGMOD
2009
ACM
142views Database» more  SIGMOD 2009»
16 years 1 months ago
A grammar-based entity representation framework for data cleaning
Fundamental to data cleaning is the need to account for multiple data representations. We propose a formal framework that can be used to reason about and manipulate data represent...
Arvind Arasu, Raghav Kaushik