Sciweavers

1821 search results - page 333 / 365
» Security-Aware Program Transformations
Sort
View
DLT
2006
13 years 10 months ago
Well-Founded Semantics for Boolean Grammars
Abstract. Boolean grammars [A. Okhotin, Information and Computation 194 (2004) 19-48] are a promising extension of context-free grammars that supports conjunction and negation. In ...
Vassilis Kountouriotis, Christos Nomikos, Panos Ro...
I3E
2003
100views Business» more  I3E 2003»
13 years 10 months ago
Use of Models and Modelling Techniques for Service Development
: E-applications are increasingly being composed from individual services that can be realized with different technologies, such as, e.g., Web Services and standard component techn...
Luís Ferreira Pires, Marten van Sinderen, C...
VMV
2001
144views Visualization» more  VMV 2001»
13 years 10 months ago
Towards Real-Time Visual Simulation of Water Surfaces
In this paper we demonstrate the benefits of the most current nVidia graphics chip set for realistic simulation and rendering of dynamic water surfaces in real-time. In particular...
Jens Schneider, Rüdiger Westermann
ISTA
2003
13 years 10 months ago
Reflective Learning in Large Companies - can it work?
: A growing number of universities and companies are now becoming focused on promoting learning that is not merely instrumental. These aspirations refer to deep learning, transform...
Mihaela-Monica Vladoiu, Beatrice Matenciuc-Antones...
NIPS
2003
13 years 10 months ago
Sparse Representation and Its Applications in Blind Source Separation
In this paper, sparse representation (factorization) of a data matrix is first discussed. An overcomplete basis matrix is estimated by using the K−means method. We have proved ...
Yuanqing Li, Andrzej Cichocki, Shun-ichi Amari, Se...