Sciweavers

1448 search results - page 157 / 290
» Restricted Stack Implementations
Sort
View
TLCA
2005
Springer
15 years 10 months ago
Subtyping Recursive Types Modulo Associative Commutative Products
This work sets the formal bases for building tools that help retrieve classes in object-oriented libraries. In such systems, the user provides a query, formulated as a set of class...
Roberto Di Cosmo, François Pottier, Didier ...
139
Voted
ETRA
2004
ACM
132views Biometrics» more  ETRA 2004»
15 years 10 months ago
A free-head, simple calibration, gaze tracking system that enables gaze-based interaction
Human eye gaze is a strong candidate to create a new application area based on human-computer interaction. To implement a really practical gaze-based interaction system, gaze dete...
Takehiko Ohno, Naoki Mukawa
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
15 years 10 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
142
Voted
GECCO
2004
Springer
132views Optimization» more  GECCO 2004»
15 years 10 months ago
Robust and Efficient Genetic Algorithms with Hierarchical Niching and a Sustainable Evolutionary Computation Model
This paper proposes a new niching method named hierarchical niching, which combines spatial niching in search space and a continuous temporal niching concept. The method is natural...
Jianjun Hu, Erik D. Goodman
LOPSTR
2004
Springer
15 years 10 months ago
Proving Termination for Logic Programs by the Query-Mapping Pairs Approach
This paper describes a method for proving termination of to logic programs based on abstract interpretation. The method ry-mapping pairs to abstract the relation between calls in t...
Naomi Lindenstrauss, Yehoshua Sagiv, Alexander Ser...