Sciweavers

687 search results - page 86 / 138
» On The Complexity of Manipulating Elections
Sort
View
VLSID
2007
IEEE
131views VLSI» more  VLSID 2007»
14 years 8 months ago
Defect-Aware Synthesis of Droplet-Based Microfluidic Biochips
Recent advances in microfluidics technology have led to the emergence of miniaturized biochip devices for biochemical analysis. A promising category of microfluidic biochips relie...
Tao Xu, Krishnendu Chakrabarty, Fei Su
SIGMOD
2004
ACM
105views Database» more  SIGMOD 2004»
14 years 8 months ago
Query Processing for SQL Updates
A rich set of concepts and techniques has been developed in the context of query processing for the efficient and robust execution of queries. So far, this work has mostly focused...
César A. Galindo-Legaria, Stefano Stefani, ...
IV
2009
IEEE
114views Visualization» more  IV 2009»
14 years 2 months ago
Chronos: A Tool for Interactive Scheduling and Visualisation of Task Hierarchies
Visualisation and structuring of tasks in a schedule, from relatively simple activities such as meeting scheduling to more complex ones such as project planning, has been traditio...
Saturnino Luz, Masood Masoodian, Daniel McKenzie, ...
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
14 years 2 months ago
Relevance Grounding for Planning in Relational Domains
Probabilistic relational models are an efficient way to learn and represent the dynamics in realistic environments consisting of many objects. Autonomous intelligent agents that gr...
Tobias Lang, Marc Toussaint
ICPR
2008
IEEE
14 years 2 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi