Sciweavers

1461 search results - page 282 / 293
» Analysis of Constraint Logic Programs
Sort
View
BSL
2004
110views more  BSL 2004»
13 years 7 months ago
Notes on quasiminimality and excellence
This paper ties together much of the model theory of the last 50 years. Shelah's attempts to generalize the Morley theorem beyond first order logic led to the notion of excel...
John T. Baldwin
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
14 years 2 months ago
Comparison of robotic and clinical motor function improvement measures for sub-acute stroke patients
Abstract— In this paper, preliminary results in motor function improvement for four sub-acute stroke patients that underwent a hybrid robotic and traditional rehabilitation progr...
Ozkan Celik, Marcia Kilchenman O'Malley, Corwin Bo...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SIGMOD
2012
ACM
224views Database» more  SIGMOD 2012»
11 years 10 months ago
Tiresias: the database oracle for how-to queries
How-To queries answer fundamental data analysis questions of the form: “How should the input change in order to achieve the desired output”. As a Reverse Data Management probl...
Alexandra Meliou, Dan Suciu
JGAA
2007
124views more  JGAA 2007»
13 years 7 months ago
Simultaneous Border Segmentation of Doughnut-Shaped Objects in Medical Images
Image segmentation with specific constraints has found applications in several areas such as biomedical image analysis and data mining. In this paper, we study the problem of sim...
Xiaodong Wu, Michael B. Merickel