Sciweavers

12459 search results - page 144 / 2492
» cans 2006
Sort
View
123
Voted
JFP
2006
103views more  JFP 2006»
15 years 4 months ago
Phantom types and subtyping
We investigate a technique from the literature, called the phantom-types technique, that uses parametric polymorphism, type constraints, and unification of polymorphic types to mo...
Matthew Fluet, Riccardo Pucella
JFP
2006
89views more  JFP 2006»
15 years 4 months ago
Featherweight generic confinement
Existing approaches to object encapsulation and confinement either rely on restrictions to programs or require the use of specialised ownership type systems. Syntactic restriction...
Alex Potanin, James Noble, Dave Clarke, Robert Bid...
JIPS
2006
72views more  JIPS 2006»
15 years 4 months ago
A Feature Selection Technique based on Distributional Differences
: This paper presents a feature selection technique based on distributional differences for efficient machine learning. Initial training data consists of data including many featur...
Sung-Dong Kim
JMIV
2006
133views more  JMIV 2006»
15 years 4 months ago
Combining Seminorms in Adaptive Lifting Schemes and Applications to Image Analysis and Compression
In this paper, we present some adaptive wavelet decompositions that can capture the directional nature of images. Our method exploits the properties of seminorms to build lifting s...
Gemma Piella, Béatrice Pesquet-Popescu, Hen...
JNCA
2006
86views more  JNCA 2006»
15 years 4 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li