Sciweavers

97 search results - page 14 / 20
» Using Generalized Constraints and Protoforms to Deal with Ad...
Sort
View
PODS
2006
ACM
137views Database» more  PODS 2006»
15 years 11 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
105
Voted
IANDC
2008
105views more  IANDC 2008»
14 years 11 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
89
Voted
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
15 years 5 months ago
Swept Volume approximation of polygon soups
— We present a fast GPU-based algorithm to approximate the Swept Volume (SV) boundary of arbitrary polygon soup models. Despite the extensive research on calculating the volume s...
Jesse C. Himmelstein, Etienne Ferre, Jean-Paul Lau...
FP
1995
156views Formal Methods» more  FP 1995»
15 years 2 months ago
Type Reconstruction for SCI
We present a type reconstruction algorithm for SCIR 10], a type system for a language with syntactic control of interference. SCIR guarantees that terms of passive type do not cau...
Howard Huang, Uday S. Reddy
76
Voted
AIEDU
2006
77views more  AIEDU 2006»
14 years 11 months ago
Constraint-based Modeling and Ambiguity
Constraint-based modeling has been used in many application areas of Intelligent Tutoring Systems as a powerful means to analyse erroneous student solutions and generate helpful fe...
Wolfgang Menzel