Sciweavers

4047 search results - page 127 / 810
» Some Properties and Some Problems on Set Functors
Sort
View
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 10 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 4 months ago
Universal Quantile Estimation with Feedback in the Communication-Constrained Setting
Abstract— We consider the following problem of decentralized statistical inference: given i.i.d. samples from an unknown distribution, estimate an arbitrary quantile subject to l...
Ram Rajagopal, Martin J. Wainwright
DBPL
1997
Springer
87views Database» more  DBPL 1997»
15 years 8 months ago
Incremental Recomputation of Recursive Queries with Nested Sets and Aggregate Functions
We examine the power of incremental evaluation systems that use an SQL-like language for maintaining recursively-de ned views. We show that recursive queries such as transitive clo...
Leonid Libkin, Limsoon Wong
PODS
1995
ACM
120views Database» more  PODS 1995»
15 years 8 months ago
Applying an Update Method to a Set of Receivers
d abstract Marc Andries, Leiden University Luca Cabibbo, University of Romey Jan Paredaens, University of Antwerpz Jan Van den Bussche, INRIAx In the context of object databases...
Marc Andries, Luca Cabibbo, Jan Paredaens, Jan Van...