Sciweavers

1805 search results - page 100 / 361
» A Theory of Closure Operators
Sort
View
EACL
2006
ACL Anthology
15 years 5 months ago
Inheritance and the CCG Lexicon
I propose a uniform approach to the elimination of redundancy in CCG lexicons, where grammars incorporate inheritance hierarchies of lexical types, defined over a simple, feature-...
Mark McConville
IJFCS
2008
102views more  IJFCS 2008»
15 years 4 months ago
Succinct Minimal Generators: Theoretical Foundations and Applications
In data mining applications, highly sized contexts are handled what usually results in a considerably large set of frequent itemsets, even for high values of the minimum support t...
Tarek Hamrouni, Sadok Ben Yahia, Engelbert Mephu N...
IJRFITA
2007
103views more  IJRFITA 2007»
15 years 4 months ago
Characterisation of RF propagation in rectangular metal pipes for passive RFID systems
: In this paper, we collect and extend the theory of Radio Frequency (RF) propagation within rectangular metal pipes. This work is motivated by the need to understand the operation...
Darmindra D. Arumugam, Daniel W. Engels
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 1 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
HASKELL
2009
ACM
15 years 11 months ago
A compositional theory for STM Haskell
We address the problem of reasoning about Haskell programs that use Software Transactional Memory (STM). As a motivating example, we consider Haskell code for a concurrent non-det...
Johannes Borgström, Karthikeyan Bhargavan, An...