Sciweavers

3360 search results - page 588 / 672
» Opportunistic Data Structures with Applications
Sort
View
127
Voted
CGI
2004
IEEE
15 years 7 months ago
Surface Models of Tube Trees
This paper describes a new method for generating surfaces of branching tubular structures with given centerlines and radii. As the centerlines are not straight lines, the cross-se...
Petr Felkel, Rainer Wegenkittl, Katja Bühler
130
Voted
CSFW
2004
IEEE
15 years 7 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
120
Voted
FLOPS
2004
Springer
15 years 7 months ago
LIX: an Effective Self-applicable Partial Evaluator for Prolog
This paper presents a self-applicable partial evaluator for a considerable subset of full Prolog. The partial evaluator is shown to achieve non-trivial specialisation and be effect...
Stephen-John Craig, Michael Leuschel
136
Voted
DEXA
2006
Springer
193views Database» more  DEXA 2006»
15 years 7 months ago
Understanding and Enhancing the Folding-In Method in Latent Semantic Indexing
Abstract. Latent Semantic Indexing(LSI) has been proved to be effective to capture the semantic structure of document collections. It is widely used in content-based text retrieval...
Xiang Wang 0002, Xiaoming Jin
140
Voted
ESOP
2006
Springer
15 years 7 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam