Sciweavers

12148 search results - page 2306 / 2430
» Generalized Bundle Methods
Sort
View
149
Voted
ADBIS
2000
Springer
166views Database» more  ADBIS 2000»
15 years 6 months ago
Integrating Bibliographical Data from Heterogeneous Digital Libraries
The integration of bibliographical data today is considered one of the most important tasks in the area of digital libraries. Various available sources of bibliographical informati...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
CAV
2000
Springer
197views Hardware» more  CAV 2000»
15 years 6 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin
DEXA
2000
Springer
132views Database» more  DEXA 2000»
15 years 6 months ago
Improving the Performance of High-Energy Physics Analysis through Bitmap Indices
Abstract. Bitmap indices are popular multi-dimensional data structures for accessing read-mostly data such as data warehouse (DW) applications, decision support systems (DSS) and o...
Kurt Stockinger, Dirk Düllmann, Wolfgang Hosc...
209
Voted
ECAI
2000
Springer
15 years 6 months ago
An Embedding of ConGolog in 3APL
Several high-level programming languages for programming agents and robots have been proposed in recent years. Each of these languages has its own features and merits. It is still...
Koen V. Hindriks, Yves Lespérance, Hector J...
SACMAT
2010
ACM
15 years 6 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
« Prev « First page 2306 / 2430 Last » Next »