Sciweavers

5344 search results - page 154 / 1069
» Privacy-Preserving Set Operations
Sort
View
EUROCAST
2007
Springer
133views Hardware» more  EUROCAST 2007»
15 years 7 months ago
Temporal Equilibrium Logic: A First Approach
In this paper we introduce an extension of Equilibrium Logic (a logical characterisation of the Answer Set Semantics for logic programs) consisting in the inclusion of modal tempor...
Pedro Cabalar, Gilberto Pérez Vega
USENIX
2008
15 years 5 months ago
Using Causality to Diagnose Configuration Bugs
We present a novel method for diagnosing configuration management errors. Our proposed approach deduces the state of a buggy computer by running predicates that test system correc...
Mona Attariyan, Jason Flinn
PDPTA
2007
15 years 4 months ago
Generic Parallel Processing Techniques for Nanoscale Spin-Wave Architectures
- In this paper, we study the algorithm design aspects of three newly developed spin-wave architectures. The architectures are capable of simultaneously transmitting multiple signa...
Mary Mehrnoosh Eshaghian-Wilner, Shiva Navab
LISA
2001
15 years 4 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
101
Voted
IJCAI
2003
15 years 4 months ago
Finite Domain Constraint Solver Learning
paper, we present an abstract framework for learning a finite domain constraint solver modeled by a set of operators enforcing a consistency. The behavior of the consistency to be...
Arnaud Lallouet, Thi-Bich-Hanh Dao, Andrei Legtche...