Sciweavers

3238 search results - page 150 / 648
» Multi-return function call
Sort
View
ICDE
2008
IEEE
171views Database» more  ICDE 2008»
14 years 9 months ago
Usage-Based Schema Matching
Existing techniques for schema matching are classified as either schema-based, instance-based, or a combination of both. In this paper, we define a new class of techniques, called ...
Hazem Elmeleegy, Mourad Ouzzani, Ahmed K. Elmagarm...
DAC
2005
ACM
14 years 9 months ago
Simulation based deadlock analysis for system level designs
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
Xi Chen, Abhijit Davare, Harry Hsieh, Alberto L. S...
ICML
2003
IEEE
14 years 8 months ago
Q-Decomposition for Reinforcement Learning Agents
The paper explores a very simple agent design method called Q-decomposition, wherein a complex agent is built from simpler subagents. Each subagent has its own reward function and...
Stuart J. Russell, Andrew Zimdars
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
14 years 8 months ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek