Sciweavers

1512 search results - page 159 / 303
» When Suboptimal Rules
Sort
View
POPL
1991
ACM
15 years 2 months ago
Subtyping Recursive Types
We investigate the interactions of subtyping and recursive types, in a simply typed λ-calculus. The two fundamental questions here are whether two (recursive) types are in the su...
Roberto M. Amadio, Luca Cardelli
CCECE
2009
IEEE
15 years 2 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
EDBTW
2006
Springer
15 years 1 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
AAAI
2010
15 years 23 days ago
Constraint Programming for Data Mining and Machine Learning
Machine learning and data mining have become aware that using constraints when learning patterns and rules can be very useful. To this end, a large number of special purpose syste...
Luc De Raedt, Tias Guns, Siegfried Nijssen
ICWS
2010
IEEE
15 years 23 days ago
Extending BPMN for Supporting Customer-Facing Service Quality Requirements
Service-oriented computing promises to create flexible business processes and applications on demand by dynamically assembling loosely coupled services within and across organizati...
Kawther Saeedi, Liping Zhao, Pedro R. Falcone Samp...