Sciweavers

280 search results - page 8 / 56
» Constraint Systems for Pattern Analysis of Constraint Logic-...
Sort
View
ASM
2010
ASM
14 years 5 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
14 years 9 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
DAC
2003
ACM
14 years 9 months ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
SCCC
2008
IEEE
14 years 2 months ago
A Domain Specific Language for the Development of Collaborative Systems
Domain-Specific Languages (DSLs) are high level languages defined for combining expressivity and simplicity by means of constructs which are close to the problem domain and distan...
Luis Mariano Bibbo, Diego García, Claudia P...
SAC
2010
ACM
14 years 3 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil