Sciweavers

5344 search results - page 368 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICDT
2003
ACM
125views Database» more  ICDT 2003»
15 years 10 months ago
XPath Containment in the Presence of Disjunction, DTDs, and Variables
XPath is a simple language for navigating an XML tree and returning a set of answer nodes. The focus in this paper is on the complexity of the containment problem for various fragm...
Frank Neven, Thomas Schwentick
DATE
2002
IEEE
99views Hardware» more  DATE 2002»
15 years 9 months ago
Gate Level Fault Diagnosis in Scan-Based BIST
A gate level, automated fault diagnosis scheme is proposed for scan-based BIST designs. The proposed scheme utilizes both fault capturing scan chain information and failing test v...
Ismet Bayraktaroglu, Alex Orailoglu
IPPS
2002
IEEE
15 years 9 months ago
A Middleware for Large Scale Networks Inspired by the Immune System
Very large scale networks such as the Internet require a new operational model to use resources efficiently and reduce the need for the administration necessary in clientserver n...
Mohamed Bakhouya, Jaafar Gaber, Abder Koukam
PSIVT
2009
Springer
135views Multimedia» more  PSIVT 2009»
15 years 9 months ago
Belief Propagation for Stereo Analysis of Night-Vision Sequences
Abstract. This paper studies different specifications of belief propagation for stereo analysis of seven rectified stereo night-vision sequences (provided by Daimler AG). As sho...
Shushi Guan, Reinhard Klette, Young Woon Woo
EPIA
2001
Springer
15 years 9 months ago
Permissive Belief Revision
Abstract. We propose a new operation of belief revision, called permissive belief revision. The underlying idea of permissive belief revision is to replace the beliefs that are aba...
Maria R. Cravo, João P. Cachopo, Ana C. Cac...