Sciweavers

1058 search results - page 62 / 212
» It's Doomed; We Can Prove It
Sort
View
ADBIS
2005
Springer
112views Database» more  ADBIS 2005»
14 years 3 months ago
Non-destructive Integration of Form-Based Views
Form documents or screen forms bring essential information on the data manipulated by an organization. They can be considered as different but often overlapping views of its whole...
Jan Hidders, Jan Paredaens, Philippe Thiran, Geert...
EUROPAR
2004
Springer
14 years 3 months ago
A Parallel PSPG Finite Element Method for Direct Simulation of Incompressible Flow
Abstract. We describe a consistent splitting approach to the pressurestabilized Petrov-Galerkin finite element method for incompressible flow. The splitting leads to (almost) exp...
Jörg Stiller, Karel Frana, Roger Grundmann, U...
POPL
2000
ACM
14 years 2 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
COLT
1992
Springer
14 years 2 months ago
On the Computational Power of Neural Nets
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Hava T. Siegelmann, Eduardo D. Sontag
IJCAI
1989
13 years 11 months ago
Learning Novel Domains Through Curiosity and Conjecture
This paper describes DIDO, a system we have developed to carry out exploratory learning of unfamiliar domains without assistance from an external teacher. The program incorporates...
Paul D. Scott, Shaul Markovitch