Sciweavers

229 search results - page 39 / 46
» Materialized View Maintenance Using Version Numbers
Sort
View
CAV
2000
Springer
187views Hardware» more  CAV 2000»
14 years 1 months ago
Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking
In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Di...
Poul Frederick Williams, Armin Biere, Edmund M. Cl...
PAMI
2007
185views more  PAMI 2007»
13 years 9 months ago
A Two-Level Generative Model for Cloth Representation and Shape from Shading
In this paper we present a two-level generative model for representing the images and surface depth maps of drapery and clothes. The upper level consists of a number of folds whic...
Feng Han, Song Chun Zhu
ISSRE
2003
IEEE
14 years 3 months ago
Exploiting Symmetries to Test Programs
Symmetries often appear as properties of many artifical settings. In Program Testing, they can be viewed as properties of programs and can be given by the tester to check the cor...
Arnaud Gotlieb
KAIS
2006
126views more  KAIS 2006»
13 years 9 months ago
Fast and exact out-of-core and distributed k-means clustering
Clustering has been one of the most widely studied topics in data mining and k-means clustering has been one of the popular clustering algorithms. K-means requires several passes ...
Ruoming Jin, Anjan Goswami, Gagan Agrawal
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 4 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp