Sciweavers

1537 search results - page 115 / 308
» On sets not belonging to algebras
Sort
View
ICDT
2010
ACM
180views Database» more  ICDT 2010»
14 years 7 months ago
Foundations of SPARQL Query Optimization
We study fundamental aspects related to the efficient processing of the SPARQL query language for RDF, proposed by the W3C to encode machine-readable information in the Semantic W...
Michael Schmidt, Michael Meier, Georg Lausen
FOSSACS
2010
Springer
14 years 5 months ago
CIA Structures and the Semantics of Recursion
Final coalgebras for a functor serve as semantic domains for state based systems of various types. For example, formal languages, streams, nonwell-founded sets and behaviors of CCS...
Stefan Milius, Lawrence S. Moss, Daniel Schwencke
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 4 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
ICCV
2007
IEEE
14 years 4 months ago
Multilinear Projection for Appearance-Based Recognition in the Tensor Framework
Numerical multilinear (tensor) algebra is a principled mathematical approach to disentangling and explicitly and parsimoniously representing the essential factors or modes of imag...
M. Alex O. Vasilescu, Demetri Terzopoulos
CCS
2007
ACM
14 years 4 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li