Sciweavers

430 search results - page 74 / 86
» Extracting Computer Algebra Programs from Statements
Sort
View
SIGMOD
1999
ACM
143views Database» more  SIGMOD 1999»
13 years 12 months ago
WALRUS: A Similarity Retrieval Algorithm for Image Databases
Traditional approaches for content-based image querying typically compute a single signature for each image based on color histograms, texture, wavelet transforms etc., and return...
Apostol Natsev, Rajeev Rastogi, Kyuseok Shim
WSC
1997
13 years 9 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
ICSM
2005
IEEE
14 years 1 months ago
Context-Free Slicing of UML Class Models
In the work presented here, we introduce a method to automatically generate a subset of a UML class model based on a user-defined criterion. The goal of this work is to allow us to...
Huzefa H. Kagdi, Jonathan I. Maletic, Andrew Sutto...
TPHOL
2007
IEEE
14 years 1 months ago
Verifying Nonlinear Real Formulas Via Sums of Squares
Techniques based on sums of squares appear promising as a general approach to the universal theory of reals with addition and multiplication, i.e. verifying Boolean combinations of...
John Harrison
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung