Sciweavers

5344 search results - page 135 / 1069
» Privacy-Preserving Set Operations
Sort
View
BPM
2008
Springer
112views Business» more  BPM 2008»
15 years 4 months ago
Covering Places and Transitions in Open Nets
We present a finite representation of all services M where the composition with a given service N is deadlock-free, and a given set of activities of N can be covered (i.e. is not d...
Christian Stahl, Karsten Wolf
119
Voted
DAGSTUHL
1996
15 years 4 months ago
Program Specialization via Program Slicing
This paper concerns the use of program slicing to perform a certain kind of program-specialization operation. We show that the specialization operation that slicing performs is dif...
Thomas W. Reps, Todd Turnidge
104
Voted
ECAI
2008
Springer
15 years 4 months ago
A Formal Approach for RDF/S Ontology Evolution
Abstract. In this paper, we consider the problem of ontology evolution in the face of a change operation. We devise a general-purpose algorithm for determining the effects and side...
George Konstantinidis, Giorgos Flouris, Grigoris A...
128
Voted
CATA
2003
15 years 4 months ago
Implementation and Performance Evaluation of Intel VTUNE Image Processing Functions in the MATLAB Environment
Many current general purpose processors use extensions to the instruction set architecture to enhance the performance of digital image processing and multimedia applications. In t...
Phaisit Chewputtanagul, David Jeff Jackson, Kennet...
107
Voted
ENTCS
2008
87views more  ENTCS 2008»
15 years 2 months ago
The Complexity of Satisfiability for Fragments of CTL and CTL*
The satisfiability problems for CTL and CTL are known to be EXPTIME-complete, resp. 2EXPTIMEcomplete (Fischer and Ladner (1979), Vardi and Stockmeyer (1985)). For fragments that u...
Arne Meier, Martin Mundhenk, Michael Thomas, Herib...