Sciweavers

1862 search results - page 328 / 373
» Constrained pattern matching
Sort
View
ICFP
2010
ACM
15 years 2 hour ago
ReCaml: execution state as the cornerstone of reconfigurations
Most current techniques fail to achieve the dynamic update of recursive functions. A focus on execution states appears to be essential in order to implement dynamic update in this...
Jérémy Buisson, Fabien Dagnat
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 12 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
ENTCS
2008
78views more  ENTCS 2008»
14 years 12 months ago
Silver: an Extensible Attribute Grammar System
Attribute grammar specification languages, like many domain specific languages, offer significant advantages to their users, such as high-level declarative constructs and domain-s...
Eric Van Wyk, Derek Bodin, Jimin Gao, Lijesh Krish...
CORR
2006
Springer
91views Education» more  CORR 2006»
14 years 12 months ago
Quasi-friendly sup-interpretations
In a previous paper [16], the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static an...
Jean-Yves Marion, Romain Péchoux
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 11 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin