Sciweavers

697 search results - page 86 / 140
» Granulation Operators on a Knowledge Base
Sort
View
ICLP
2010
Springer
13 years 7 months ago
Runtime Addition of Integrity Constraints in an Abductive Proof Procedure
Abductive Logic Programming is a computationally founded representation of abductive reasoning. In most ALP frameworks, integrity constraints express domainspecific logical relati...
Marco Alberti, Marco Gavanelli, Evelina Lamma
RAID
2010
Springer
13 years 7 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
TCOM
2010
110views more  TCOM 2010»
13 years 7 months ago
Joint data QR-detection and Kalman estimation for OFDM time-varying Rayleigh channel complex gains
—This paper deals with the case of a high speed mobile receiver operating in an orthogonal-frequency-divisionmultiplexing (OFDM) communication system. Assuming the knowledge of d...
Hussein Hijazi, Laurent Ros
DEXA
2010
Springer
133views Database» more  DEXA 2010»
13 years 3 months ago
Low Power Management of OLTP Applications Considering Disk Drive Power Saving Function
Abstract. A power-saving management for OLTP applications has become an important task for user budgets and datacenter operations. This paper presents a novel power-saving method f...
Norifumi Nishikawa, Miyuki Nakano, Masaru Kitsureg...
ISSPIT
2010
13 years 3 months ago
On the use of compressive sampling for wide-band spectrum sensing
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain this knowledge by estimating the power spe...
Dennis Sundman, Saikat Chatterjee, Mikael Skoglund