Sciweavers

1268 search results - page 135 / 254
» One Logic to Use Them All
Sort
View
110
Voted
AAAI
2010
15 years 2 months ago
Compilation Complexity of Common Voting Rules
In computational social choice, one important problem is to take the votes of a subelectorate (subset of the voters), and summarize them using a small number of bits. This needs t...
Lirong Xia, Vincent Conitzer
173
Voted
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
16 years 28 days ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
102
Voted
LOPSTR
2001
Springer
15 years 5 months ago
On Deforesting Parameters of Accumulating Maps
Abstract. Deforestation is a well-known program transformation technique which eliminates intermediate data structures that are passed between functions. One of its weaknesses is t...
Kazuhiko Kakehi, Robert Glück, Yoshihiko Futa...
GIS
1992
ACM
15 years 4 months ago
Machine Induction of Geospatial Knowledge
Machine learning techniques such as tree induction have become accepted tools for developing generalisations of large data sets, typically for use with production rule systems in p...
Peter A. Whigham, Robert I. McKay, J. R. Davis
ACTA
2011
14 years 7 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink