Sciweavers

150 search results - page 17 / 30
» Counting Results in Weak Formalisms
Sort
View
MEMOCODE
2010
IEEE
13 years 6 months ago
A regular expression matching using non-deterministic finite automaton
Abstract--This paper shows an implementation of CANSCID (Combined Architecture for Stream Categorization and Intrusion Detection). To satisfy the required system throughput, the pa...
Hiroshi Nakahara, Tsutomu Sasao, Munehiro Matsuura
KCAP
2011
ACM
12 years 11 months ago
LinkedDataLens: linked data as a network of networks
With billions of assertions and counting, the Web of Data represents the largest multi-contributor interlinked knowledge base that ever existed. We present a novel framework for a...
Yolanda Gil, Paul T. Groth
NC
2010
179views Neural Networks» more  NC 2010»
13 years 7 months ago
Representation before computation
My main objective is to point out a fundamental weakness in the conventional conception of computation and suggest a promising way out. This weakness is directly related to a gross...
Lev Goldfarb
RSA
2010
94views more  RSA 2010»
13 years 7 months ago
Word maps and spectra of random graph lifts
We study here the spectra of random lifts of graphs. Let G be a finite connected graph, and let the infinite tree T be its universal cover space. If λ1 and ρ are the spectral ...
Nati Linial, Doron Puder

Publication
337views
15 years 3 days ago
Redistribution Mechanisms for Assignment of Heterogeneous Objects
There are p heterogeneous objects to be assigned to n competing agents (n > p) each with unit demand. It is required to design a Groves mechanism for this assignment problem ...
Sujit Gujar, Y Narahari