Sciweavers

5344 search results - page 51 / 1069
» Privacy-Preserving Set Operations
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Belief operations for motivated BDI agents
The beliefs of an agent reflecting her subjective view of the world constitute one of the main components of a BDI agent. In order to incorporate new information coming from other...
Patrick Krümpelmann, Matthias Thimm, Manuela ...
ER
2005
Springer
178views Database» more  ER 2005»
14 years 3 months ago
Assessing Topological Consistency for Collapse Operation in Generalization of Spatial Databases
Generalization of spatial databases consists of complicated operations including not only geometric transformations but also topological changes. The changes often result in an inc...
Hae-Kyong Kang, Ki-Joune Li
SIAMMA
2010
62views more  SIAMMA 2010»
13 years 4 months ago
Transmission Eigenvalues for Operators with Constant Coefficients
In this paper we study the interior transmission problem and transmission eigenvalues for multiplicative perturbations of linear partial differential operator of order 2 with cons...
Michael Hitrik, Katsiaryna Krupchyk, Petri Ola, La...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Sufficient mutation operators for measuring test effectiveness
Mutants are automatically-generated, possibly faulty variants of programs. The mutation adequacy ratio of a test suite is the ratio of non-equivalent mutants it is able to identif...
Akbar Siami Namin, James H. Andrews, Duncan J. Mur...
ADBIS
2009
Springer
127views Database» more  ADBIS 2009»
14 years 4 months ago
Window Update Patterns in Stream Operators
Continuous queries applied over nonterminating data streams usually specify windows in order to obtain an evolving –yet restricted– set of tuples and thus provide timely result...
Kostas Patroumpas, Timos K. Sellis