Sciweavers

1798 search results - page 29 / 360
» Generating presentation constraints from rhetorical structur...
Sort
View
ADBIS
2006
Springer
165views Database» more  ADBIS 2006»
14 years 22 days ago
Fragmenting XML Documents via Structural Constraints
Abstract. XML query processors suffer from main-memory limitations that prevent them from processing large XML documents. While content-based predicates can be used to project down...
Angela Bonifati, Alfredo Cuzzocrea, Bruno Zinno
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
CIMCA
2006
IEEE
14 years 3 months ago
Reducing the Size of If-Then Rules Generated from Data Tables with Graded Attributes
Presented is a method for reducing the size of if-then rules generated from data tables with graded attributes. Data tables with graded attributes represent data structures descri...
Radim Belohlávek, Vilém Vychodil
CP
2009
Springer
14 years 9 days ago
Constraint-Based Local Search for the Automatic Generation of Architectural Tests
Abstract. This paper considers the automatic generation of architectural tests (ATGP), a fundamental problem in processor validation. ATGPs are complex conditional constraint satis...
Pascal Van Hentenryck, Carleton Coffrin, Boris Gut...
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
14 years 2 months ago
Pseudo-Functional Scan-based BIST for Delay Fault
This paper presents a pseudo-functional BIST scheme that attempts to minimize the over-testing problem of logic BIST for delay and crosstalk-induced failures. The over-testing pro...
Yung-Chieh Lin, Feng Lu, Kwang-Ting Cheng