Sciweavers

210 search results - page 37 / 42
» A Unified Theory of Irony and Its Computational Formalizatio...
Sort
View
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
TPHOL
2008
IEEE
14 years 1 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
ACMICEC
2006
ACM
152views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Capacity allocation with competitive retailers
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Masabumi Furuhata, Dongmo Zhang
SIGIR
2006
ACM
14 years 1 months ago
LDA-based document models for ad-hoc retrieval
Search algorithms incorporating some form of topic model have a long history in information retrieval. For example, cluster-based retrieval has been studied since the 60s and has ...
Xing Wei, W. Bruce Croft
ICSE
1998
IEEE-ACM
13 years 11 months ago
What You See Is What You Test: A Methodology for Testing Form-Based Visual Programs
Form-based visual programming languages, which include commercial spreadsheets and various research systems, have had a substantial impact on end-user computing. Research shows, h...
Gregg Rothermel, Lixin Li, Christopher DuPuis, Mar...