Sciweavers

603 search results - page 46 / 121
» Referent Systems and Relational Grammar
Sort
View
ICFHR
2010
207views Biometrics» more  ICFHR 2010»
13 years 4 months ago
Forensic Signature Verification Competition 4NSigComp2010 - Detection of Simulated and Disguised Signatures
This competition scenario aims at a performance comparison of several automated systems for the task of signature verification. The systems have to rate the probability of authors...
Marcus Liwicki, C. Elisa van den Heuvel, Bryan Fou...
LATA
2009
Springer
14 years 4 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
LPAR
2010
Springer
13 years 8 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann
ICSE
2004
IEEE-ACM
14 years 10 months ago
Efficient Decentralized Monitoring of Safety in Distributed Systems
We describe an efficient decentralized monitoring algorithm that monitors a distributed program's execution to check for violations of safety properties. The monitoring is ba...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
ANLP
1994
73views more  ANLP 1994»
13 years 11 months ago
Understanding Location Descriptions in the LEI System
Biological specimens have historicallybeen labeled with English descriptions of the location of collection. To perform spatial, statistical, or historic studies, these description...
David N. Chin, Matthew McGranaghan, Tung-Tse Chen