Sciweavers

58 search results - page 3 / 12
» Low-Level Ideal Signatures and General Integrity Idealizatio...
Sort
View
ENTCS
2010
90views more  ENTCS 2010»
14 years 9 months ago
Recursive Program Schemes and Context-Free Monads
Solutions of recursive program schemes over a given signature were characterized by Bruno Courcelle as precisely the context-free (or algebraic) -trees. These are the finite and ...
Jirí Adámek, Stefan Milius, Jiri Vel...
KCAP
2009
ACM
15 years 4 months ago
Knowledge integration across multiple texts
One of the grand challenges of AI is to build systems that learn by reading. The ideal system would construct a rich knowledge base capable of automated reasoning. We have built a...
Doo Soon Kim, Ken Barker, Bruce W. Porter
LPAR
2005
Springer
15 years 2 months ago
Incremental Integrity Checking: Limitations and Possibilities
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be...
Henning Christiansen, Davide Martinenghi
PODC
2011
ACM
14 years 9 days ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 4 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...