Sciweavers

804 search results - page 98 / 161
» On the Termination of the Chase Algorithm
Sort
View
112
Voted
LPAR
2004
Springer
15 years 6 months ago
Abstract DPLL and Abstract DPLL Modulo Theories
DPLL and DPLL Modulo Theories Robert Nieuwenhuis , Albert Oliveras , and Cesare Tinelli We introduce Abstract DPLL, a general and simple abstract rule-based formulation of the Davi...
Robert Nieuwenhuis, Albert Oliveras, Cesare Tinell...
93
Voted
APLAS
2003
ACM
15 years 5 months ago
Controlling and Optimizing the Usage of One Resource
This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling...
Antoine Galland, Mathieu Baudet
85
Voted
ICDM
2002
IEEE
70views Data Mining» more  ICDM 2002»
15 years 5 months ago
Progressive Modeling
Presently, inductive learning is still performed in a frustrating batch process. The user has little interaction with the system and no control over the final accuracy and traini...
Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, S...
IPPS
1999
IEEE
15 years 4 months ago
Reconfigurable Parallel Sorting and Load Balancing: HeteroSort
HeteroSort load balances and sorts within static or dynamic networks. Upon failure of a node or path, HeteroSort uses a genetic algorithm to minimize the distribution path by optim...
Emmett Davis, Bonnie Holte Bennett, Bill Wren, Lin...
ACISP
1998
Springer
15 years 4 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...