Sciweavers

1687 search results - page 16 / 338
» Which pointer analysis should I use
Sort
View
AI
2008
Springer
13 years 7 months ago
On the notion of concept I
It is well known that classical set theory is not expressive enough to adequately model categorization and prototype theory. Recent work on compositionality and concept determinat...
Michael Freund
ESOP
2006
Springer
13 years 11 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
ICDE
1991
IEEE
175views Database» more  ICDE 1991»
13 years 11 months ago
Constraint-Based Reasoning in Deductive Databases
— Constraints play an important role in the efficient query evaluation in deductive databases. In this paper, constraint-based query evaluation in deductive databases is investi...
Jiawei Han
CLEF
2006
Springer
13 years 11 months ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
EC
1998
178views ECommerce» more  EC 1998»
13 years 7 months ago
The Simple Genetic Algorithm and the Walsh Transform: Part I, Theory
This paper is the first part of a two part series. It proves a number of direct relationships between the Fourier transform and the simple genetic algorithm. (For a binary repres...
Michael D. Vose, Alden H. Wright