Sciweavers

4722 search results - page 641 / 945
» Encoding Program Executions
Sort
View
185
Voted
NABIC
2010
14 years 10 months ago
Evolutionary design of edge detector using rule-changing Cellular automata
A new design method for Cellular automata (CA) rules are described. We have already proposed a method for designing the transition rules of two-dimensional 256-state CA for graysca...
Shohei Sato, Hitoshi Kanoh
107
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Random block-angular matrices for distributed data storage
Random binary matrices have found many applications in signal processing and coding. Rateless codes, for example, are based on the random generation of codewords by means of inner...
Paulo Jorge S. G. Ferreira, Bruno Jesus, Jose Viei...
218
Voted
ECOOP
2009
Springer
16 years 4 months ago
Featherweight Jigsaw: A Minimal Core Calculus for Modular Composition of Classes
We present FJig, a simple calculus where basic building blocks are classes in the style of Featherweight Java, declaring elds, methods and one constructor. However, inheritance has...
Giovanni Lagorio, Marco Servetto, Elena Zucca
158
Voted
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
15 years 9 months ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper
139
Voted
RAID
1999
Springer
15 years 8 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo