Sciweavers

5344 search results - page 209 / 1069
» Privacy-Preserving Set Operations
Sort
View
151
Voted
ITICSE
1996
ACM
15 years 7 months ago
An interactive environment for the teaching of computer architecture
The operation of a computer can be conceptualised as a large, discrete and constantly changing set of state information. However even for the simplest uni-processor the data set o...
Paul S. Coe, Laurence M. Williams, Roland N. Ibbet...
124
Voted
AAAI
2004
15 years 5 months ago
Logic Programs with Abstract Constraint Atoms
We propose and study extensions of logic programming with constraints represented as generalized atoms of the form C(X), where X is a finite set of atoms and C is act constraint (...
Victor W. Marek, Miroslaw Truszczynski
124
Voted
ICAI
2004
15 years 5 months ago
Inductive System Health Monitoring
- The Inductive Monitoring System (IMS) software was developed to provide a technique to automatically produce health monitoring knowledge bases for systems that are either difficu...
David L. Iverson
127
Voted
ADCM
2007
100views more  ADCM 2007»
15 years 3 months ago
An efficient algorithm for the computation of the metric average of two intersecting convex polygons, with application to morphi
Motivated by the method for the reconstruction of 3D objects from a set of parallel cross sections, based on the binary operation between 2D sets termed “metric average”, we de...
Evgeny Lipovetsky, Nira Dyn
112
Voted
FSTTCS
2010
Springer
15 years 1 months ago
Global Model Checking of Ordered Multi-Pushdown Systems
In this paper, we address the verification problem of ordered multi-pushdown systems: A multistack extension of pushdown systems that comes with a constraint on stack operations s...
Mohamed Faouzi Atig