Sciweavers

2517 search results - page 7 / 504
» Specifying Weak Sets
Sort
View
SDB
1995
95views Database» more  SDB 1995»
13 years 11 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
ESORICS
2009
Springer
14 years 8 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
EWCBR
1994
Springer
13 years 11 months ago
Integrating Induction and Case-Based Reasoning: Methodological Approach and First Evaluations
We propose in this paper a general framework for integrating inductive and case-based reasoning (CBR) techniques for diagnosis tasks. We present a set of practical integrated appro...
Eric Auriol, Michel Manago, Klaus-Dieter Althoff, ...
CKEC
1991
13 years 11 months ago
Case-Based Reasoning and Model-Based Knowledge Acquisition
We propose in this paper a general framework for integrating inductive and case-based reasoning techniques for diagnosis tasks. We present a set of practical integrated approaches...
Dietmar Janetzko, Gerhard Strube
SAMOS
2010
Springer
13 years 5 months ago
Identifying communication models in Process Networks derived from Weakly Dynamic Programs
—Process Networks (PNs) is an appealing computation ion helping to specify an application in parallel form and realize it on parallel platforms. The key questions to be answered ...
Dmitry Nadezhkin, Todor Stefanov