Sciweavers

1675 search results - page 222 / 335
» Some thoughts on teaching programming and programming langua...
Sort
View
UM
2005
Springer
14 years 3 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...
CSL
2004
Springer
14 years 3 months ago
Set Constraints on Regular Terms
Set constraints are a useful formalism for verifying properties of programs. Usually, they are interpreted over the universe of finite terms. However, some logic languages allow i...
Pawel Rychlikowski, Tomasz Truderung
CL
2000
Springer
14 years 2 months ago
Querying Inconsistent Databases: Algorithms and Implementation
In this paper, an algorithm for obtaining consistent answers to queries posed to inconsistent relational databases is presented. The algorith is proven to be sound, terminating and...
Alexander Celle, Leopoldo E. Bertossi
IWMM
2000
Springer
144views Hardware» more  IWMM 2000»
14 years 1 months ago
Memory Allocation with Lazy Fits
Dynamic memory allocation is an important part of modern programming languages. It is important that it be done fast without wasting too much memory. Memory allocation using lazy ...
Yoo C. Chung, Soo-Mook Moon
CP
2009
Springer
14 years 10 months ago
Failed Value Consistencies for Constraint Satisfaction
In constraint satisfaction, basic inferences rely on some properties of constraint networks, called consistencies, that allow the identification of inconsistent instantiations (als...
Christophe Lecoutre, Olivier Roussel