Sciweavers

4702 search results - page 190 / 941
» How to Copyright a Function
Sort
View
153
Voted
DCG
2007
77views more  DCG 2007»
15 years 4 months ago
Stability of Critical Points with Interval Persistence
Scalar functions defined on a topological space Ω are at the core of many applications such as shape matching, visualization and physical simulations. Topological persistence i...
Tamal K. Dey, Rephael Wenger
130
Voted
JAT
2007
103views more  JAT 2007»
15 years 4 months ago
Monotonicity of zeros of Jacobi polynomials
Denote by xn,k(α, β), k = 1, . . . , n, the zeros of the Jacobi polynomial P (α,β) n (x). It is well known that xn,k(α, β) are increasing functions of β and decreasing func...
Dimitar K. Dimitrov, Fernando R. Rafaeli
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
15 years 11 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
HASKELL
2006
ACM
15 years 11 months ago
Strong types for relational databases
Haskell’s type system with multi-parameter constructor classes and functional dependencies allows static (compile-time) computations to be expressed by logic programming on the ...
Alexandra Silva, Joost Visser
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh