Sciweavers

94 search results - page 16 / 19
» Confluence of Conditional Rewrite Systems
Sort
View
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 7 months ago
Optimizing away joins on data streams
Abstract. Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. Often, such streaming aggregation queries involve joining...
Lukasz Golab, Theodore Johnson, Nick Koudas, Dives...
FOSSACS
2001
Springer
14 years 1 days ago
On the Modularity of Deciding Call-by-Need
In a recent paper we introduced a new framework for the study of call by need computations. Using elementary tree automata techniques and ground tree transducers we obtained simple...
Irène Durand, Aart Middeldorp
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 11 months ago
An approach for the state estimation of Takagi-Sugeno models and application to sensor fault diagnosis
— In this paper, a new method to design an observer for nonlinear systems described by Takagi-Sugeno (TS) model, with unmeasurable premise variables, is proposed. Most of existin...
Dalil Ichalal, Benoît Marx, José Rago...
ENTCS
2007
158views more  ENTCS 2007»
13 years 7 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
RTA
2007
Springer
14 years 1 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...