Sciweavers

3255 search results - page 562 / 651
» Combination of Abstractions in the ASTR
Sort
View
COMPSAC
1996
IEEE
14 years 2 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
IDMS
1997
Springer
106views Multimedia» more  IDMS 1997»
14 years 2 months ago
System for Screening Objectionable Images Using Daubechies' Wavelets and Color Histograms
Abstract. This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combina...
James Ze Wang, Gio Wiederhold, Oscar Firschein
ISHPC
1997
Springer
14 years 2 months ago
Implementing Iterative Solvers for Irregular Sparse Matrix Problems in High Performance Fortran
Abstract. Writing e cient iterative solvers for irregular, sparse matrices in HPF is hard. The locality in the computations is unclear, and for e ciency we use storage schemes that...
Eric de Sturler, Damian Loher
ECAI
1994
Springer
14 years 2 months ago
Concept Language with Number Restrictions and Fixpoints, and its Relationship with Mu-calculus
Abstract. Many recent works point out that there are several possibilities of assigning a meaning to a concept definition containing some sort of recursion. In this paper, we argue...
Giuseppe De Giacomo, Maurizio Lenzerini
ESORICS
1994
Springer
14 years 2 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen