Sciweavers

3735 search results - page 536 / 747
» Order compression schemes
Sort
View
ESCIENCE
2006
IEEE
15 years 9 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
ISN
2000
Springer
162views Communications» more  ISN 2000»
15 years 9 months ago
An Approach to Network Control and Resource Management Based on Intelligent Agents
Network Control is currently carried out mainly by means of signalling protocols. Although these protocols are robust and facilitate standardisation, they present several drawback...
Evangelos Vayias, John Soldatos, Nikolas Mitrou
SAIG
2000
Springer
15 years 9 months ago
Fragmental Specialization
Traditional offline program specialization relies on staging of a computation into two levels, static and dynamic. We present a generalization thereof where the static input data o...
Simon Helsen, Peter Thiemann
SSPR
2000
Springer
15 years 9 months ago
Encoding Nondeterministic Finite-State Tree Automata in Sigmoid Recursive Neural Networks
Abstract. Recently, a number of authors have explored the use of recursive recursive neural nets (RNN) for the adaptive processing of trees or tree-like structures. One of the most...
Mikel L. Forcada, Rafael C. Carrasco
137
Voted
DEXA
1995
Springer
125views Database» more  DEXA 1995»
15 years 9 months ago
An SQL Extension Supporting User Viewpoints
- In order to accomplish independence on the logical data organization, a relational DBMS must be capable of interpreting query language sentences which reference attributes belong...
Giuseppe Bellavia, Dario Maio, Stefano Rizzi