Sciweavers

280 search results - page 20 / 56
» Constraint Systems for Pattern Analysis of Constraint Logic-...
Sort
View
PEPM
1993
ACM
15 years 3 months ago
Binding-Time Analysis and the Taming of C Pointers
The aim of binding-time analysis is to determine when variables, expressions, statements, etc. in a program can be evaluated by classifying these into static (compile-time) and dy...
Lars Ole Andersen
ECOOP
2012
Springer
13 years 2 months ago
Object Initialization in X10
X10 is an object oriented programming language with a sophisticated type system (constraints, class invariants, non-erased generics, closures) and concurrency constructs (asynchron...
Yoav Zibin, David Cunningham, Igor Peshansky, Vija...
SERP
2007
15 years 1 months ago
From Functional Requirements through Test Evaluation Design to Automatic Test Data Patterns Retrieval - a Concept for Testing of
- Functional testing of software dedicated for hybrid embedded systems should start at the early development phase and requires analysis of discrete and continuous signals, where t...
Justyna Zander-Nowicka, Abel Marrero Pérez,...
EMNLP
2011
13 years 11 months ago
Identifying Relations for Open Information Extraction
Open Information Extraction (IE) is the task of extracting assertions from massive corpora without requiring a pre-specified vocabulary. This paper shows that the output of state...
Anthony Fader, Stephen Soderland, Oren Etzioni
ACSAC
2001
IEEE
15 years 3 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad