Sciweavers

2196 search results - page 103 / 440
» Practical Reasoning Using Values
Sort
View
CAISE
2009
Springer
15 years 6 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
EUROCRYPT
2000
Springer
15 years 6 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
ICCD
2002
IEEE
110views Hardware» more  ICCD 2002»
15 years 11 months ago
Efficient PEEC-Based Inductance Extraction Using Circuit-Aware Techniques
Practical approaches for on-chip inductance extraction to obtain a sparse, stable and accurate inverse inductance matrix K are proposed. The novelty of our work is in using circui...
Haitian Hu, Sachin S. Sapatnekar
ASP
2003
Springer
15 years 7 months ago
Using Nested Logic Programs for Answer Set Programming
We present a general method to improve computation of answer sets by analyzing structural properties of normal logic programs. Therefore we use labeled directed graphs associated t...
Thomas Linke
AIIDE
2006
15 years 3 months ago
Lightweight Simulation of Air Traffic Control Using Simple Temporal Networks
Flight simulators are becoming more sophisticated and realistic, and the requirements of those using them are becoming more demanding. Air traffic control simulation for such simu...
Russell Knight