Sciweavers

5344 search results - page 239 / 1069
» Privacy-Preserving Set Operations
Sort
View
DATESO
2010
153views Database» more  DATESO 2010»
15 years 1 months ago
Answering Metric Skyline Queries by PM-tree
Abstract. The task of similarity search in multimedia databases is usually accomplished by range or k nearest neighbor queries. However, the expressing power of these "single-...
Tomás Skopal, Jakub Lokoc
DLOG
2009
15 years 1 months ago
A Framework for Reasoning with Expressive Continuous Fuzzy Description Logics
In the current paper we study the reasoning problem for fuzzy SI (f-SI) under arbitrary continuous fuzzy operators. Our work can be seen as an extension of previous works that stud...
Giorgos Stoilos, Giorgos B. Stamou
JAIR
2011
144views more  JAIR 2011»
14 years 10 months ago
Iterated Belief Change Due to Actions and Observations
In action domains where agents may have erroneous beliefs, reasoning about the effects of actions involves reasoning about belief change. In this paper, we use a transition system...
Aaron Hunter, James P. Delgrande
TSE
2011
165views more  TSE 2011»
14 years 10 months ago
Bristlecone: Language Support for Robust Software Applications
— We present Bristlecone, a programming language for robust software systems. Bristlecone applications have two components: a high-level organization specification that describe...
Brian Demsky, Sivaji Sundaramurthy
DAC
2004
ACM
16 years 4 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim