Sciweavers

251 search results - page 16 / 51
» Pure Type Systems without Explicit Contexts
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 9 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
14 years 1 months ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
14 years 2 months ago
Interactive learning of visual topological navigation
— We present a topological navigation system that is able to visually recognize the different rooms of an apartment and guide a robot between them. Specifically tailored for sma...
David Filliat
ACL
2010
13 years 5 months ago
A Structured Model for Joint Learning of Argument Roles and Predicate Senses
In predicate-argument structure analysis, it is important to capture non-local dependencies among arguments and interdependencies between the sense of a predicate and the semantic...
Yotaro Watanabe, Masayuki Asahara, Yuji Matsumoto
ECOOP
2005
Springer
14 years 1 months ago
Attached Types and Their Application to Three Open Problems of Object-Oriented Programming
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Bertrand Meyer