Sciweavers

598 search results - page 31 / 120
» Generic Trace Theory
Sort
View
ICDT
2009
ACM
130views Database» more  ICDT 2009»
14 years 10 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
SIGCOMM
2003
ACM
14 years 3 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 1 months ago
From joint convexity of quantum relative entropy to a concavity theorem of Lieb
This paper provides a succinct proof of a 1973 theorem of Lieb that establishes the concavity of a certain trace function. The development relies on a deep result from quantum info...
Joel A. Tropp
PKDD
2010
Springer
193views Data Mining» more  PKDD 2010»
13 years 8 months ago
Process Mining Meets Abstract Interpretation
Mining Meets Abstract Interpretation J. Carmona and J. Cortadella Universitat Polit`ecnica de Catalunya, Spain The discovery of process models out of system traces is a problem tha...
Josep Carmona, Jordi Cortadella
TPHOL
2009
IEEE
14 years 4 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu