Sciweavers

940 search results - page 159 / 188
» Rules and Strategies in Java
Sort
View
PEPM
2004
ACM
15 years 5 months ago
Proving termination of membership equational programs
Advanced typing, matching, and evaluation strategy features, as well as very general conditional rules, are routinely used in equational programming languages such as, for example...
Francisco Durán, Salvador Lucas, José...
117
Voted
SDMW
2004
Springer
15 years 5 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
88
Voted
AVBPA
2003
Springer
78views Biometrics» more  AVBPA 2003»
15 years 5 months ago
Resampling for Face Recognition
Abstract. A number of applications require robust human face recognition under varying environmental lighting conditions and different facial expressions, which considerably vary ...
Xiaoguang Lu, Anil K. Jain
129
Voted
ICALP
2003
Springer
15 years 5 months ago
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces
Although evolutionary algorithms (EAs) are widely used in practical optimization, their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime ar...
Jens Jägersküpper
ICSE
2003
IEEE-ACM
15 years 5 months ago
An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model
Improvements in the software development process depend on our ability to collect and analyze data drawn from various phases of the development life cycle. Our design metrics rese...
Dolores M. Zage, Wayne M. Zage