Sciweavers

34 search results - page 5 / 7
» Hierarchically Performed Hazard Origin and Propagation Studi...
Sort
View
TACAS
2010
Springer
178views Algorithms» more  TACAS 2010»
15 years 4 months ago
An Alternative to SAT-Based Approaches for Bit-Vectors
The theory BV of bit-vectors, i.e. fixed-size arrays of bits equipped with standard low-level machine instructions, is becoming very popular in formal verification. Standard solv...
Sébastien Bardin, Philippe Herrmann, Floria...
TFS
2011
194views Education» more  TFS 2011»
14 years 4 months ago
Top-Down Induction of Fuzzy Pattern Trees
Fuzzy pattern tree induction was recently introduced as a novel machine learning method for classification. Roughly speaking, a pattern tree is a hierarchical, tree-like structur...
R. Senge, Eyke Hüllermeier
TKDE
1998
77views more  TKDE 1998»
14 years 9 months ago
Techniques for Update Handling in the Enhanced Client-Server DBMS
—The Client-Server computing paradigm has significantly influenced the way modern Database Management Systems are designed and built. In such systems, clients maintain data pages...
Alex Delis, Nick Roussopoulos
INFOCOM
2005
IEEE
15 years 3 months ago
Network coding for large scale content distribution
— We propose a new scheme for content distribution of large files that is based on network coding. With network coding, each node of the distribution network is able to generate...
Christos Gkantsidis, Pablo Rodriguez
DOLAP
2000
ACM
15 years 1 months ago
Incremental Update to Aggregated Information for Data Warehouses over Internet
We consider the view maintenance problem in a web-based environment, in which clients query information from databases, stored in the form of materialized data warehouses, without...
Miranda Chan, Hong Va Leong, Antonio Si