Sciweavers

4592 search results - page 669 / 919
» Framework for Studying Substitution
Sort
View
FSTTCS
2007
Springer
14 years 5 months ago
Closures and Modules Within Linear Logic Concurrent Constraint Programming
There are two somewhat contradictory ways of looking at modules in a given programming language. On the one hand, module systems are largely independent of the particulars of progr...
Rémy Haemmerlé, François Fage...
GEOS
2007
Springer
14 years 5 months ago
Supporting Complex Thematic, Spatial and Temporal Queries over Semantic Web Data
Spatial and temporal data are critical components in many applications. This is especially true in analytical domains such as national security and criminal investigation. Often, t...
Matthew Perry, Amit P. Sheth, Farshad Hakimpour, P...
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
14 years 4 months ago
Repudiation Detection in Handwritten Documents
The problems that arise in forensic document examination, are usually quite different from that of traditional writer identification and verification tasks, where the data is ass...
Sachin Gupta, Anoop M. Namboodiri
ISNN
2007
Springer
14 years 4 months ago
Memetic Algorithms for Feature Selection on Microarray Data
In this paper, we present two novel memetic algorithms (MAs) for gene selection. Both are synergies of Genetic Algorithm (wrapper methods) and local search methods (filter methods...
Zexuan Zhu, Yew-Soon Ong
ISW
2007
Springer
14 years 4 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...