Sciweavers

20175 search results - page 3950 / 4035
» Is abstraction the key to computing
Sort
View
WOLLIC
2009
Springer
14 years 4 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
BTW
2009
Springer
153views Database» more  BTW 2009»
14 years 4 months ago
Formalizing ETL Jobs for Incremental Loading of Data Warehouses
Abstract: Extract-transform-load (ETL) tools are primarily designed for data warehouse loading, i.e. to perform physical data integration. When the operational data sources happen ...
Thomas Jörg, Stefan Deßloch
ECSQARU
2009
Springer
14 years 4 months ago
Merging Belief Bases Represented by Logic Programs
Abstract. This paper presents a method which allows for merging beliefs expressed thanks to logic programming with stable model semantics. This method is based on the syntactic mer...
Julien Hué, Odile Papini, Eric Würbel
ESWS
2009
Springer
14 years 4 months ago
MoKi: The Enterprise Modelling Wiki
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents aspects relevant to the activity of an ente...
Chiara Ghidini, Barbara Kump, Stefanie N. Lindstae...
FSTTCS
2009
Springer
14 years 4 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
« Prev « First page 3950 / 4035 Last » Next »