Sciweavers

228 search results - page 28 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
ICFP
1999
ACM
15 years 6 months ago
Relating Typability and Expressiveness in Finite-Rank Intersection Type Systems (Extended Abstract)
d Abstract) Assaf J. Kfoury∗ Boston University http://www.cs.bu.edu/˜kfoury Harry G. Mairson† Brandeis University http://www.cs.brandeis.edu/˜mairson Franklyn A. Turbak‡ We...
Assaf J. Kfoury, Harry G. Mairson, Franklyn A. Tur...
134
Voted
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 9 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
MICCAI
2008
Springer
16 years 3 months ago
Group Statistics of DTI Fiber Bundles Using Spatial Functions of Tensor Measures
We present a framework for hypothesis testing of differences between groups of DTI fiber tracts. An anatomical, tract-oriented coordinate system provides a basis for estimating the...
Casey Goodlett, P. Thomas Fletcher, John H. Gilm...
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
15 years 6 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng
LISP
2007
74views more  LISP 2007»
15 years 1 months ago
Improving the lazy Krivine machine
Krivine presents the K machine, which produces weak head normal form results. Sestoft introduces several call-by-need variants of the K machine that implement result sharing via pu...
Daniel P. Friedman, Abdulaziz Ghuloum, Jeremy G. S...