Sciweavers

1998 search results - page 135 / 400
» Situated Control Rules
Sort
View
LOPSTR
2009
Springer
15 years 11 months ago
A Transformational Approach for Proving Properties of the CHR Constraint Store
Proving termination of, or generating efficient control for Constraint Handling Rules (CHR) programs requires information about the kinds of constraints that can show up in the CHR...
Paolo Pilozzi, Tom Schrijvers, Maurice Bruynooghe
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
15 years 11 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald
CPAIOR
2005
Springer
15 years 10 months ago
Formulations and Reformulations in Integer Programming
Creating good integer programming formulations had, as a basic axiom, the rule “Find formulations with tighter linear relaxations”. This rule, while useful when using unsophist...
Michael A. Trick
SDMW
2005
Springer
15 years 10 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
NIPS
2004
15 years 5 months ago
Spike-timing Dependent Plasticity and Mutual Information Maximization for a Spiking Neuron Model
We derive an optimal learning rule in the sense of mutual information maximization for a spiking neuron model. Under the assumption of small fluctuations of the input, we find a s...
Taro Toyoizumi, Jean-Pascal Pfister, Kazuyuki Aiha...