Sciweavers

2584 search results - page 434 / 517
» On the Forward Checking Algorithm
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
ILP
2007
Springer
14 years 3 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
ACSAC
2006
IEEE
14 years 3 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
14 years 3 months ago
On Potential Validity of Document-Centric XML Documents
Document-centric XML document creation is a process of marking up textual content rather than typing text in a predefined structure. It turns out that, although the final docume...
Ionut Emil Iacob, Alex Dekhtyar, Michael I. Dekhty...
ICRA
2006
IEEE
103views Robotics» more  ICRA 2006»
14 years 3 months ago
A Time-budgeted Collision Detection Method
- Collision detection is a critical module in many applications such as computer graphics, robot motion planning, physical simulation, CAD/CAM, and molecular modeling. Many efficie...
Yu-Te Lin, Tsai-Yen Li