Sciweavers

1513 search results - page 148 / 303
» Cryptographic Pattern Matching
Sort
View
CC
2001
Springer
177views System Software» more  CC 2001»
15 years 6 months ago
Imperative Program Transformation by Rewriting
Abstract. We present a method of specifying standard imperative program optimisations as a rewrite system. To achieve this we have extended the idea of matching sub-terms in expres...
David Lacey, Oege de Moor
139
Voted
BMCBI
2007
134views more  BMCBI 2007»
15 years 2 months ago
Automatic generation of 3D motifs for classification of protein binding sites
Background: Since many of the new protein structures delivered by high-throughput processes do not have any known function, there is a need for structure-based prediction of prote...
Jean-Christophe Nebel, Pawel Herzyk, David R. Gilb...
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
16 years 3 months ago
An Efficient XPath Query Processor for XML Streams
Streaming XPath evaluation algorithms must record a potentially exponential number of pattern matches when both predicates and descendant axes are present in queries, and the XML ...
Yi Chen, Susan B. Davidson, Yifeng Zheng

Publication
285views
16 years 17 days ago
Bilateral Symmetry Detection and Segmentation via Symmetry-Growing
We present a novel and robust method for localizing and segmenting bilaterally symmetric patterns from real-world images. On the basis of symmetrically matched pairs of local featu...
Minsu Cho (Seoul National University), Kyoung Mu L...
104
Voted
PADL
2010
Springer
15 years 11 months ago
Conversion by Evaluation
Abstract. We show how testing convertibility of two types in dependently typed systems can advantageously be implemented instead untyped normalization by evaluation, thereby reusin...
Mathieu Boespflug