Sciweavers

5344 search results - page 92 / 1069
» Privacy-Preserving Set Operations
Sort
View
ENTCS
2002
84views more  ENTCS 2002»
13 years 9 months ago
Set Types and Applications
We present pmlB, a programming language that includes primitive sets and associated operations. The language is equipped with a precise type discipline that statically captures dy...
Christian Skalka, Scott F. Smith
INFSOF
2002
78views more  INFSOF 2002»
13 years 9 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...
SIAMAM
2002
122views more  SIAMAM 2002»
13 years 9 months ago
A Level Set Method for Anisotropic Geometric Diffusion in 3D Image Processing
A new morphological multiscale method in 3D image processing is presented which combines the image processing methodology based on nonlinear diffusion equations and the theory of g...
Martin Rumpf, Tobias Preußer
DATE
2002
IEEE
151views Hardware» more  DATE 2002»
14 years 3 months ago
Analog Circuit Sizing Using Adaptive Worst-Case Parameter Sets
In this paper, a method for nominal design of analog integrated circuits is presented that includes process variations and operating ranges by worst-case parameter sets. These set...
Robert Schwencker, Frank Schenkel, Michael Pronath...
ESSLLI
1999
Springer
14 years 2 months ago
Representing the Adverb Very in Fuzzy Set Theory
We recall the concept of a linguistic variable and the representation of its values (i.e. linguistic terms) by means of fuzzy sets. In this framework adverbs are represented by fuz...
Martine De Cock