Sciweavers

1024 search results - page 52 / 205
» Value complete, column complete, predicate complete
Sort
View
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
15 years 3 months ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
JDCTA
2010
188views more  JDCTA 2010»
14 years 8 months ago
Compressive Sensing Signal Detection Algorithm Based on Location Information of Sparse Coefficients
Without reconstructing the signal themselves, signal detection could be solved by detection algorithm, which directly processes sampling value obtained from compressive sensing si...
Bing Liu, Ping Fu, Shengwei Meng, Lunping Guo
CORR
2002
Springer
96views Education» more  CORR 2002»
15 years 1 months ago
The Sketch of a Polymorphic Symphony
In previous work, we have introduced functional strategies, that is, first-class generic functions that can traverse into terms of any type while mixing uniform and type-specific ...
Ralf Lämmel
CSL
2009
Springer
15 years 8 months ago
Model Checking FO(R) over One-Counter Processes and beyond
Abstract. One-counter processes are pushdown processes over a singleton stack alphabet (plus a stack-bottom symbol). We study the problems of model checking asynchronous products o...
Anthony Widjaja To
ITNG
2006
IEEE
15 years 7 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim