Sciweavers

1513 search results - page 199 / 303
» Cryptographic Pattern Matching
Sort
View
ICFP
2009
ACM
16 years 2 months ago
Complete and decidable type inference for GADTs
GADTs have proven to be an invaluable language extension, a.o. for ensuring data invariants and program correctness. Unfortunately, they pose a tough problem for type inference: w...
Tom Schrijvers, Simon L. Peyton Jones, Martin Sulz...
101
Voted
ICIAP
2005
ACM
16 years 2 months ago
Time and Date OCR in CCTV Video
Automatic recognition of time and date stamps in CCTV video enables the inclusion of time-based queries in video indexing applications. Such ability needs to deal with problems of ...
Ginés García-Mateos, Andrés G...
130
Voted
FLOPS
2010
Springer
15 years 9 months ago
Beluga: Programming with Dependent Types, Contextual Data, and Contexts
The logical framework LF provides an elegant foundation for specifying formal systems and proofs and it is used successfully in a wide range of applications such as certifying code...
Brigitte Pientka
122
Voted
VR
2009
IEEE
159views Virtual Reality» more  VR 2009»
15 years 9 months ago
Indoor vs. Outdoor Depth Perception for Mobile Augmented Reality
We tested users’ depth perception of virtual objects in our mobile augmented reality (AR) system in both indoor and outdoor environments using a depth matching task. The indoor ...
Mark A. Livingston, Zhuming Ai, J. Edward Swan II,...
110
Voted
AINA
2008
IEEE
15 years 8 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai