Sciweavers

354 search results - page 34 / 71
» Constraints of Behavioural Inheritance
Sort
View
POPL
1998
ACM
15 years 4 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
CSCLP
2007
Springer
15 years 6 months ago
Quasi-Linear-Time Algorithms by Generalisation of Union-Find in CHR
Abstract. The union-find algorithm can be seen as solving simple equations between variables or constants. With a few lines of code change, we generalise its implementation in CHR...
Thom W. Frühwirth
COMPSAC
2002
IEEE
15 years 4 months ago
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’...
James Joshi, Elisa Bertino, Arif Ghafoor
NAACL
1994
15 years 1 months ago
Use of Lexical and Syntactic Techniques in Recognizing Handwritten Text
The output of handwritten word recognizers (WR) tends to be very noisy due to various factors. In order to compensate for this behaviour, several choices of the WR must be initial...
Rohini K. Srihari
ECAL
2007
Springer
15 years 6 months ago
Spatial Embedding and Complexity: The Small-World Is Not Enough
The “order for free” exhibited by some classes of system has been exploited by natural selection in order to build systems capable of exhibiting complex behaviour. Here we expl...
Christopher L. Buckley, Seth Bullock