Sciweavers

866 search results - page 82 / 174
» A Formal Investigation of
Sort
View
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
14 years 4 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
LICS
2008
IEEE
14 years 4 months ago
Context Matching for Compressed Terms
This paper is an investigation of the matching problem for term equations s = t where s contains context variables, and both terms s and t are given using some kind of compressed ...
Adria Gascón, Guillem Godoy, Manfred Schmid...
AI
2008
Springer
14 years 4 months ago
Aspects of Inconsistency Resolution in Modular Ontologies
Modularization entails more efficient reasoning and better performance in the ontology manipulation process. Therefore, the development of modular ontologies has recently received ...
Faezeh Ensan, Weichang Du
ARITH
2007
IEEE
14 years 4 months ago
Multiplication by a Constant is Sublinear
Abstract— This paper explores the use of the double-base number system (DBNS) for constant integer multiplication. The DBNS recoding scheme represents integers – in this case c...
Vassil S. Dimitrov, Laurent Imbert, Andrew Zakaluz...
ISVLSI
2007
IEEE
131views VLSI» more  ISVLSI 2007»
14 years 4 months ago
Improving the Quality of Bounded Model Checking by Means of Coverage Estimation
Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it i...
Ulrich Kühne, Daniel Große, Rolf Drechs...