Sciweavers

1362 search results - page 221 / 273
» The Projection of Systolic Programs
Sort
View
ICTAI
1993
IEEE
15 years 6 months ago
MERIT Motifs
MERIT (Multimedia Extensions of Retrieval Interaction Tools)1 provides a user-centered interface to a database covering European research programs, projects, and consortia in the ...
Ulrich Thiel, Martin Kracker, Adelheit Stein
COCO
1994
Springer
100views Algorithms» more  COCO 1994»
15 years 6 months ago
Relative to a Random Oracle, NP is Not Small
Resource-bounded measure as originated by Lutz is an extension of classical measure theory which provides a probabilistic means of describing the relative sizes of complexity clas...
Steven M. Kautz, Peter Bro Miltersen
SIGMOD
1989
ACM
118views Database» more  SIGMOD 1989»
15 years 6 months ago
The Architecture Of An Active Data Base Management System
The HiPAC project is investigating active, time-constrained databasemanagment. An active DBMS is one which automatically executes specified actions when speciifed conditions arise...
Dennis R. McCarthy, Umeshwar Dayal
B
2007
Springer
15 years 6 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 5 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit