Sciweavers

3271 search results - page 549 / 655
» Controlled Multicast Framework
Sort
View
PLILP
1993
Springer
14 years 9 days ago
Narrowing Approximations as an Optimization for Equational Logic Programs
Abstract. Solving equations in equational theories is a relevant programming paradigm which integrates logic and equational programming into one unified framework. Efficient metho...
María Alpuente, Moreno Falaschi, Marí...
GIS
1992
ACM
14 years 8 days ago
Machine Induction of Geospatial Knowledge
Machine learning techniques such as tree induction have become accepted tools for developing generalisations of large data sets, typically for use with production rule systems in p...
Peter A. Whigham, Robert I. McKay, J. R. Davis
VLDB
1993
ACM
112views Database» more  VLDB 1993»
14 years 8 days ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
ACMICEC
2007
ACM
103views ECommerce» more  ACMICEC 2007»
14 years 6 days ago
Sampling of information goods
With the development of information technology and the emergence of electronic market places, great business opportunities are created with reduced spatial restraints, lowered sea...
Chong (Alex) Wang, Xiaoquan (Michael) Zhang
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 6 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...