Sciweavers

1626 search results - page 228 / 326
» Subtyping with Power Types
Sort
View
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 9 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
ICDM
2003
IEEE
119views Data Mining» more  ICDM 2003»
15 years 9 months ago
A Dynamic Adaptive Self-Organising Hybrid Model for Text Clustering
Clustering by document concepts is a powerful way of retrieving information from a large number of documents. This task in general does not make any assumption on the data distrib...
Chihli Hung, Stefan Wermter
ISORC
2003
IEEE
15 years 9 months ago
Embedded Linux Outlook in the PostPC Industry
This paper presents an analysis of the future of Embedded Linux in the PostPC industry. This analysis is carried out by first examining the current forces at work in the PostPC ma...
Seongsoo Hong
SLIP
2003
ACM
15 years 9 months ago
Error-correction and crosstalk avoidance in DSM busses
Aggressive process scaling and increasing clock rates have made crosstalk noise an important issue in VLSI design. Switching on adjacent wires on long bus lines can increase delay...
Ketan N. Patel, Igor L. Markov
FOSSACS
2003
Springer
15 years 9 months ago
Generalized Iteration and Coiteration for Higher-Order Nested Datatypes
Abstract. We solve the problem of extending Bird and Paterson’s generalized folds for nested datatypes and its dual to inductive and coinductive constructors of arbitrarily high ...
Andreas Abel, Ralph Matthes, Tarmo Uustalu