Sciweavers

5344 search results - page 199 / 1069
» Privacy-Preserving Set Operations
Sort
View
106
Voted
CPC
2006
84views more  CPC 2006»
15 years 3 months ago
Splitter Theorems for Cubic Graphs
Let ;k g be the class of k-connected cubic graphs of girth at least g. For several choices of k and g, we determine a set Ok g of graph operations, for which, if G and H are graph...
Guoli Ding, Jinko Kanno
109
Voted
GPEM
2006
89views more  GPEM 2006»
15 years 3 months ago
Morphological algorithm design for binary images using genetic programming
This paper presents a Genetic Programming (GP) approach to the design of Mathematical Morphology (MM) algorithms for binary images. The algorithms are constructed using logic opera...
Marcos I. Quintana, Riccardo Poli, Ela Claridge
118
Voted
ENTCS
2007
82views more  ENTCS 2007»
15 years 3 months ago
Syntactic Logical Relations for Polymorphic and Recursive Types
The method of logical relations assigns a relational interpretation to types that expresses operational invariants satisfied by all terms of a type. The method is widely used in ...
Karl Crary, Robert Harper
98
Voted
INFSOF
2002
72views more  INFSOF 2002»
15 years 3 months ago
Translating object-oriented database transactions into relational transactions
In this paper, we present methods of translating transactions from object-oriented database(OODB) to relational database(RDB). The process involves schema mapping in data definiti...
Joseph Fong
125
Voted
SPIN
2010
Springer
15 years 1 months ago
An Automata-Based Symbolic Approach for Verifying Programs on Relaxed Memory Models
This paper addresses the problem of verifying programs for the relaxed memory models implemented in modern processors. Specifically, it considers the TSO (Total Store Order) relax...
Alexander Linden, Pierre Wolper