Sciweavers

2584 search results - page 345 / 517
» On the Forward Checking Algorithm
Sort
View
75
Voted
EDCC
2006
Springer
15 years 1 months ago
Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware
- This paper proposes a novel technique for preventing a wide range of data errors from corrupting the execution of applications. The proposed technique enables automated derivatio...
Karthik Pattabiraman, Giacinto Paolo Saggese, Dani...
ESWS
2006
Springer
15 years 1 months ago
Resolving Inconsistencies in Evolving Ontologies
Abstract. Changing a consistent ontology may turn the ontology into an inconsistent state. It is the task of an approach supporting ontology evolution to ensure an ontology evolves...
Peter Plessers, Olga De Troyer
89
Voted
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 1 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
KDD
1995
ACM
248views Data Mining» more  KDD 1995»
15 years 1 months ago
Data Mining for Loan Evaluation at ABN AMRO: A Case Study
Wedescribe a case study in data miningfor personal loan evaluation, performed at the ABNAMRObank in the Netherlands. Historical data of clients and their pay-backbehaviourare used...
A. J. Feelders, A. J. F. le Loux, J. W. van't Zand
CSR
2010
Springer
15 years 1 months ago
Sofic and Almost of Finite Type Tree-Shifts
We introduce the notion of sofic tree-shifts which corresponds to symbolic dynamical systems of infinite trees accepted by finite tree automata. We show that, contrary to shifts of...
Nathalie Aubrun, Marie-Pierre Béal