Sciweavers

1711 search results - page 192 / 343
» Completing pseudojump operators
Sort
View
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
13 years 9 months ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
IJCAI
1989
13 years 9 months ago
Managing Efficiently Temporal Relations Through Indexed Spanning Trees
We are interested here in the design of a very efficient Time-Map Manager, able to deal with a large knowledge-base of several thou­ sand time-tokens in demanding applications su...
Malik Ghallab, A. Mounir Alaoui
ENTCS
2002
134views more  ENTCS 2002»
13 years 8 months ago
Implementing Compositional Analysis Using Intersection Types With Expansion Variables
A program analysis is compositional when the analysis result for a particular program fragment is obtained solely from the results for its immediate subfragments via some composit...
Assaf J. Kfoury, Geoffrey Washburn, Joe Wells
TIP
1998
240views more  TIP 1998»
13 years 8 months ago
DCT-based motion estimation
—We propose novel discrete cosine transform (DCT) pseudophase techniques to estimate shift/delay between two onedimensional (1-D) signals directly from their DCT coefficients by...
Ut-Va Koc, K. J. Ray Liu
RAID
2010
Springer
13 years 6 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis