Sciweavers

1781 search results - page 155 / 357
» Functional Answer Set Programming
Sort
View
AICCSA
2006
IEEE
86views Hardware» more  AICCSA 2006»
15 years 7 months ago
On the Optimal Deployment of Heterogeneous Sensing Devices
The problem of optimally deploying a heterogeneous set of sensing devices in environments with differential surveillance requirements is presented. The problem is formulated in th...
Rabie Ramadan, Khaled Abdelghany, Hesham El-Rewini
138
Voted
PLDI
2011
ACM
14 years 4 months ago
Evaluating value-graph translation validation for LLVM
Translation validators are static analyzers that attempt to verify that program transformations preserve semantics. Normalizing translation validators do so by trying to match the...
Jean-Baptiste Tristan, Paul Govereau, Greg Morrise...
IFIP
2007
Springer
15 years 7 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
IPCO
2010
174views Optimization» more  IPCO 2010»
15 years 3 months ago
On Lifting Integer Variables in Minimal Inequalities
This paper contributes to the theory of cutting planes for mixed integer linear programs (MILPs). Minimal valid inequalities are well understood for a relaxation of an MILP in tab...
Amitabh Basu, Manoel B. Campêlo, Michele Con...
107
Voted
CORR
2007
Springer
98views Education» more  CORR 2007»
15 years 1 months ago
Guarded Hybrid Knowledge Bases
Recently, there has been a lot of interest in the integration of Description Logics and rules on the Semantic Web. We define guarded hybrid knowledge bases (or g-hybrid knowledge...
Stijn Heymans, Jos de Bruijn, Livia Predoiu, Crist...