Sciweavers

596 search results - page 39 / 120
» Theories of Access Consciousness
Sort
View
DAGSTUHL
2001
15 years 10 days ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
JCO
2008
98views more  JCO 2008»
14 years 11 months ago
A survey on nonadaptive group testing algorithms through the angle of decoding
Abstract Group testing, sometimes called pooling design, has been applied to a variety of problems such as blood testing, multiple access communication, coding theory, among others...
Hong-Bin Chen, Frank K. Hwang
TIT
2010
76views Education» more  TIT 2010»
14 years 5 months ago
Tighter bounds on the capacity of finite-state channels via Markov set-chains
The theory of Markov set-chains is applied to derive upper and lower bounds on the capacity of finite-state channels that are tighter than the classic bounds by Gallager. The new ...
Jun Chen, Haim H. Permuter, Tsachy Weissman
ACL
2004
15 years 11 days ago
Using Linguistic Principles to Recover Empty Categories
This paper describes an algorithm for detecting empty nodes in the Penn Treebank (Marcus et al., 1993), finding their antecedents, and assigning them function tags, without access...
Richard Campbell
CORR
2008
Springer
75views Education» more  CORR 2008»
14 years 11 months ago
Inductive and Coinductive Components of Corecursive Functions in Coq
In Constructive Type Theory, recursive and corecursive definitions are subject to syntactic restrictions which guarantee termination for recursive functions and productivity for c...
Yves Bertot, Ekaterina Komendantskaya