Sciweavers

2777 search results - page 324 / 556
» Example centric programming
Sort
View
CSFW
2004
IEEE
15 years 6 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
CSLP
2004
Springer
15 years 6 months ago
Multi-dimensional Graph Configuration for Natural Language Processing
Many tasks in computational linguistics can be regarded as configuration problems. In this paper, we introduce the notion of lexicalised multi-dimensional configuration problems (l...
Ralph Debusmann, Denys Duchier, Marco Kuhlmann
FSKD
2006
Springer
203views Fuzzy Logic» more  FSKD 2006»
15 years 6 months ago
An Interval Semi-absolute Deviation Model For Portfolio Selection
Interval number is a kind of special fuzzy number and the interval approach is a good method to deal with some uncertainty. The semi-absolute deviation risk function is extended to...
Yong Fang, Shouyang Wang
ECAL
1995
Springer
15 years 6 months ago
A New Self-Reproducing Cellular Automaton Capable of Construction and Computation
We present a new self-reproducing cellular automaton capable of construction and computation beyond self-reproduction. Our automaton makes use of some of the concepts developed by...
Gianluca Tempesti
ER
1995
Springer
109views Database» more  ER 1995»
15 years 6 months ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers