Sciweavers

4205 search results - page 598 / 841
» Typed Mobile Objects
Sort
View
SPC
2005
Springer
14 years 1 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
CLEF
2004
Springer
14 years 1 months ago
Question Answering Pilot Task at CLEF 2004
A Pilot Question Answering Task has been activated in the Cross-Language Evaluation Forum 2004 with a twofold objective. In the first place, the evaluation of Question Answering ...
Jesús Herrera, Anselmo Peñas, Felisa...
DAS
2004
Springer
14 years 1 months ago
Word Grouping in Document Images Based on Voronoi Tessellation
Voronoi tessellation of image elements provides an intuitive and appealing definition of proximity, which has been suggested as an effective tool for the description of relations...
Yue Lu, Zhe Wang, Chew Lim Tan
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
14 years 1 months ago
Comparing Discrete and Continuous Genotypes on the Constrained Portfolio Selection Problem
In financial engineering the problem of portfolio selection has drawn much attention in the last decades. But still unsolved problems remain, while on the one hand the type of mod...
Felix Streichert, Holger Ulmer, Andreas Zell
GPCE
2004
Springer
14 years 1 months ago
A Fresh Calculus for Name Management
Abstract. We define a basic calculus for name management, which is obtained by an appropriate combination of three ingredients: extensible records (in a simplified form), names (...
Davide Ancona, Eugenio Moggi