Sciweavers

3305 search results - page 100 / 661
» Can we Rely on SQL
Sort
View
APN
2003
Springer
14 years 3 months ago
Nets Enriched over Closed Monoidal Structures
Abstract. We show how the firing rule of Petri nets relies on a residuation operation for the commutative monoid of natural numbers. On that basis we introduce closed monoidal str...
Eric Badouel, Jules Chenou
SPIRE
1998
Springer
14 years 2 months ago
Fast Approximate String Matching in a Dictionary
A successful technique to search large textual databases allowing errors relies on an online search in the vocabulary of the text. To reduce the time of that online search, we ind...
Ricardo A. Baeza-Yates, Gonzalo Navarro
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
14 years 1 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
NIPS
2001
13 years 11 months ago
Correlation Codes in Neuronal Populations
Population codes often rely on the tuning of the mean responses to the stimulus parameters. However, this information can be greatly suppressed by long range correlations. Here we...
Maoz Shamir, Haim Sompolinsky
IJCAI
1989
13 years 11 months ago
Detecting and Correcting Errors of Omission After Explanation-Based Learning
In this paper, we address an issue that arises when the background knowledge used by explanationbased learning is incorrect. In particular, we consider the problems that can be ca...
Michael J. Pazzani