Sciweavers

6514 search results - page 783 / 1303
» Low-Knowledge Algorithm Control
Sort
View
147
Voted
DIS
2007
Springer
15 years 9 months ago
Efficient Incremental Mining of Top-K Frequent Closed Itemsets
In this work we study the mining of top-K frequent closed itemsets, a recently proposed variant of the classical problem of mining frequent closed itemsets where the support thresh...
Andrea Pietracaprina, Fabio Vandin
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
DSN
2004
IEEE
15 years 8 months ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...
ECAI
2006
Springer
15 years 8 months ago
Reasoning with Inconsistencies in Propositional Peer-to-Peer Inference Systems
In a peer-to-peer inference system, there is no centralized control or hierarchical organization: each peer is equivalent in functionality and cooperates with other peers in order...
Philippe Chatalic, Gia Hien Nguyen, Marie-Christin...
138
Voted
ATS
2003
IEEE
100views Hardware» more  ATS 2003»
15 years 8 months ago
A Processor-Based Built-In Self-Repair Design for Embedded Memories
We propose an embedded processor-based built-in self-repair (BISR) design for embedded memories. In the proposed design we reuse the embedded processor that can be found on almost...
Chin-Lung Su, Rei-Fu Huang, Cheng-Wen Wu