Sciweavers

1054 search results - page 60 / 211
» Guarded Expressions in Practice
Sort
View
ICDE
2007
IEEE
119views Database» more  ICDE 2007»
15 years 6 months ago
Stream Variables: A Quick but not Dirty SQL Extension for Continuous Queries
The ability to query data streams is of increasing importance and has been identified as a crucial element for modern organizations and agencies. This paper identifies a class o...
Damianos Chatziantoniou, Yannis Sotiropoulos
VTC
2007
IEEE
109views Communications» more  VTC 2007»
15 years 6 months ago
Asymptotic BEP and SEP of MRC in Correlated Ricean Fading and Non-Gaussian Noise
— In this paper, we study the asymptotic behavior of the bit–error probability (BEP) and symbol–error probability (SEP) of coherent maximum–ratio combining (MRC) in correla...
Ali Nezampour, Amir Nasri, Robert Schober, Yao Ma
ACL2
2006
ACM
15 years 5 months ago
Soundness of the simply typed lambda calculus in ACL2
To make it practical to mechanize proofs in programming language metatheory, several capabilities are required of the theorem proving framework. One must be able to represent and ...
Sol Swords, William R. Cook
ISNN
2005
Springer
15 years 5 months ago
An Information Criterion for Informative Gene Selection
It is important in bioinformatics research and applications to select or discover informative genes of a tumor from microarray data. However, most of the existing methods are based...
Fei Ge, Jinwen Ma
WIA
2004
Springer
15 years 5 months ago
Brute Force Determinization of NFAs by Means of State Covers
Finite automata determinization is a critical operation for numerous practical applications such as regular expression search. Algorithms have to deal with the possible blow up of ...
Jean-Marc Champarnaud, Fabien Coulon, Thomas Paran...