Sciweavers

2432 search results - page 433 / 487
» Cryptographic logical relations
Sort
View
GIS
1992
ACM
15 years 8 months ago
Machine Induction of Geospatial Knowledge
Machine learning techniques such as tree induction have become accepted tools for developing generalisations of large data sets, typically for use with production rule systems in p...
Peter A. Whigham, Robert I. McKay, J. R. Davis
KR
2010
Springer
15 years 8 months ago
Improving Query Answering over DL-Lite Ontologies
The DL-Lite family of Description Logics has been designed with the specific goal of allowing for answering complex queries (in particular, conjunctive queries) over ontologies w...
Riccardo Rosati, Alessandro Almatelli
DSD
2007
IEEE
132views Hardware» more  DSD 2007»
15 years 8 months ago
On-Chip Cache Device Scaling Limits and Effective Fault Repair Techniques in Future Nanoscale Technology
In this study, we investigate different cache fault tolerance techniques to determine which will be most effective when on-chip memory cell defect probabilities exceed those of cu...
David Roberts, Nam Sung Kim, Trevor N. Mudge
ICCBR
2007
Springer
15 years 8 months ago
Application of the Revision Theory to Adaptation in Case-Based Reasoning: The Conservative Adaptation
Case-based reasoning aims at solving a problem by the adaptation of the solution of an already solved problem that has been retrieved in a case base. This paper defines an approach...
Jean Lieber
APSCC
2006
IEEE
15 years 7 months ago
A Model-Driven Aspect Framework for Grid Service Development
Service-Oriented Architecture (SOA) plays an important role in the next generation computing models for scientific and commercial applications. But difficulties in the development...
WenJun Li, ChuWei Huang, QiangChao Chen, Hui Bian