Sciweavers

11740 search results - page 86 / 2348
» More Problems in Rewriting
Sort
View
SCAM
2002
IEEE
15 years 5 months ago
Parallel Support for Source Code Analysis and Modification
Tools that analyze and enhance large-scale software systems using symbolic reasoning are computationally expensive, and yet processors are cheap. We believe that enabling tools wi...
Ira D. Baxter
78
Voted
FOSSACS
2001
Springer
15 years 5 months ago
On the Modularity of Deciding Call-by-Need
In a recent paper we introduced a new framework for the study of call by need computations. Using elementary tree automata techniques and ground tree transducers we obtained simple...
Irène Durand, Aart Middeldorp
ECCV
2006
Springer
15 years 4 months ago
An Efficient Method for Tensor Voting Using Steerable Filters
In many image analysis applications there is a need to extract curves in noisy images. To achieve a more robust extraction, one can exploit correlations of oriented features over a...
Erik Franken, Markus van Almsick, Peter Rongen, Lu...
123
Voted
CIKM
2008
Springer
15 years 2 months ago
Pruning nested XQuery queries
We present in this paper an approach for XQuery optimization that exploits minimization opportunities raised in composition-style nesting of queries. More precisely, we consider t...
Bilel Gueni, Talel Abdessalem, Bogdan Cautis, Emma...
100
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 2 months ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...