Sciweavers

182 search results - page 35 / 37
» Removing Propagation Redundant Constraints in Redundant Mode...
Sort
View
SBBD
2004
119views Database» more  SBBD 2004»
14 years 11 months ago
Computing the Dependency Basis for Nested List Attributes
Multi-valued dependencies (MVDs) are an important class of constraints that is fundamental for relational database design. Although modern applications increasingly require the su...
Sven Hartmann, Sebastian Link
CVPR
2003
IEEE
15 years 11 months ago
Independent Component Analysis in a Facial Local Residue Space
In this paper, we propose an ICA(Indepdendent Component Analysis) based face recognition algorithm, which is robust to illumination and pose variation. Generally, it is well known...
Tae-Kyun Kim, Hyunwoo Kim, Wonjun Hwang, Seok-Cheo...
CADE
2007
Springer
15 years 3 months ago
Semantic Selection of Premisses for Automated Theorem Proving
We develop and implement a novel algorithm for discovering the optimal sets of premisses for proving and disproving conjectures in first-order logic. The algorithm uses interpret...
Petr Pudlak
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
69
Voted
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
15 years 1 months ago
Enhanced Diameter Bounding via Structural
Bounded model checking (BMC) has gained widespread industrial use due to its relative scalability. Its exhaustiveness over all valid input vectors allows it to expose arbitrarily ...
Jason Baumgartner, Andreas Kuehlmann