Sciweavers

1486 search results - page 49 / 298
» Firewall Rules Analysis
Sort
View
CADE
2009
Springer
16 years 13 days ago
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs
Abstract. An approach based on term rewriting techniques for the automated termination analysis of imperative programs operating on integers is presented. An imperative program is ...
Stephan Falke, Deepak Kapur
ASAP
1996
IEEE
90views Hardware» more  ASAP 1996»
15 years 4 months ago
Hierarchical Static Analysis Of Structured Systems Of Affine Recurrence Equations
The Alpha language, based on systems of affine recurrence equations over polyhedral domains, allows the expression of complex algorithms as hierarchical, parameterized structures ...
Florent de Dinechin, Sophie Robert
ADAC
2010
105views more  ADAC 2010»
14 years 12 months ago
Inference for robust canonical variate analysis
We consider the problem of optimally separating two multivariate populations. Robust linear discriminant rules can be obtained by replacing the empirical means and covariance in th...
Stefan Van Aelst, Gert Willems
CVPR
1998
IEEE
16 years 1 months ago
Generation of the Euclidean Skeleton from the Vector Distance Map by a Bisector Decision Rule
The Euclidean skeleton is essential for general shape representation. This paper provides an e cient method to extract a well-connected Euclidean skeleton by a neighbor bisector d...
Hong Li, Albert M. Vossepoel
IEAAIE
2005
Springer
15 years 5 months ago
Analyzing Multi-level Spatial Association Rules Through a Graph-Based Visualization
Association rules discovery is a fundamental task in spatial data mining where data are naturally described at multiple levels of granularity. ARES is a spatial data mining system ...
Annalisa Appice, Paolo Buono