Sciweavers

2516 search results - page 373 / 504
» Integrity Constraints for XML
Sort
View
ECAI
2010
Springer
14 years 11 months ago
ISAC - Instance-Specific Algorithm Configuration
We present a new method for instance-specific algorithm configuration (ISAC). It is based on the integration of the algorithm configuration system GGA and the recently proposed sto...
Serdar Kadioglu, Yuri Malitsky, Meinolf Sellmann, ...
WWW
2010
ACM
14 years 10 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
CACM
2010
113views more  CACM 2010»
14 years 10 months ago
Reasoning about the unknown in static analysis
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated as ...
Isil Dillig, Thomas Dillig, Alex Aiken
CORR
2008
Springer
76views Education» more  CORR 2008»
14 years 10 months ago
Copper Planar Microcoils Applied to Magnetic Actuation
Recent advances in microtechnology allow realization of planar microcoils. These components are integrated in MEMS as magnetic sensor or actuator. In the latter case, it is necess...
Johan Moulin, Marion Woytasik, Emile Martincic, El...
CORR
2008
Springer
64views Education» more  CORR 2008»
14 years 10 months ago
Implementing general belief function framework with a practical codification for low complexity
In this chapter, we propose a new practical codification of the elements of the Venn diagram in order to easily manipulate the focal elements. In order to reduce the complexity, t...
Arnaud Martin