• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,029
Next 10 →

Representing Action and Change by Logic Programs

by Michael Gelfond, Vladimir Lifschitz - Journal of Logic Programming , 1993
"... We represent properties of actions in a logic programming language that uses both classical negation and negation as failure. The method is applicable to temporal projection problems with incomplete information, as well as to reasoning about the past. It is proved to be sound relative to a semantics ..."
Abstract - Cited by 414 (25 self) - Add to MetaCart
We represent properties of actions in a logic programming language that uses both classical negation and negation as failure. The method is applicable to temporal projection problems with incomplete information, as well as to reasoning about the past. It is proved to be sound relative to a

Face recognition using laplacianfaces

by Xiaofei He, Shuicheng Yan, Yuxiao Hu, Partha Niyogi, Hong-jiang Zhang - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2005
"... Abstract—We propose an appearance-based face recognition method called the Laplacianface approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) wh ..."
Abstract - Cited by 389 (38 self) - Add to MetaCart
Beltrami operator on the face manifold. In this way, the unwanted variations resulting from changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis shows that PCA, LDA, and LPP can be obtained from different graph models. We compare the proposed Laplacianface

Ownership Types for Flexible Alias Protection

by David G. Clarke, John M. Potter, James Noble - In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA , 1998
"... Object-oriented programming languages allow inter-object aliasing. Although necessary to construct linked data structures and networks of interacting objects, aliasing is problematic in that an aggregate object's state can change via an alias to one of its components, without the aggregate bein ..."
Abstract - Cited by 365 (41 self) - Add to MetaCart
Object-oriented programming languages allow inter-object aliasing. Although necessary to construct linked data structures and networks of interacting objects, aliasing is problematic in that an aggregate object's state can change via an alias to one of its components, without the aggregate

Dynamic Queries for Visual Information Seeking

by Ben Shneiderman - IEEE Software , 1994
"... Dynamic queries are a novel approach to information seeking that may enable users to cope with information overload. They allow users to see an overview of the database, rapidly (100 msec updates) explore and conveniently filter out unwanted information. Users fly through information spaces by incre ..."
Abstract - Cited by 298 (35 self) - Add to MetaCart
Dynamic queries are a novel approach to information seeking that may enable users to cope with information overload. They allow users to see an overview of the database, rapidly (100 msec updates) explore and conveniently filter out unwanted information. Users fly through information spaces

On the constancy of Internet path properties

by Yin Zhang, Nick Duffield, Vern Paxson, Scott Shenker - In Proceedings of ACM SIGCOMM Internet Measurement Workshop , 2001
"... Abstract — Many Internet protocols and operational procedures use measurements to guide future actions. This is an effective strategy if the quantities being measured exhibit a degree of constancy: that is, in some fundamental sense, they are not changing. In this paper we explore three different no ..."
Abstract - Cited by 294 (15 self) - Add to MetaCart
Abstract — Many Internet protocols and operational procedures use measurements to guide future actions. This is an effective strategy if the quantities being measured exhibit a degree of constancy: that is, in some fundamental sense, they are not changing. In this paper we explore three different

Using UML for modeling complex real-time systems

by Bran Selic, Jim Rumbaugh , 1998
"... The embedded real-time software systems encountered in applications such as telecommunications, aerospace, and defense typically tend to be large and extremely complex. It is crucial in such systems that the software is designed with a sound architecture. A good architecture not only simplifies cons ..."
Abstract - Cited by 259 (6 self) - Add to MetaCart
The embedded real-time software systems encountered in applications such as telecommunications, aerospace, and defense typically tend to be large and extremely complex. It is crucial in such systems that the software is designed with a sound architecture. A good architecture not only simplifies

Sound and Precise Analysis of Web Applications for Injection Vulnerabilities

by Gary Wassermann, Zhendong Su - PLDI'07 , 2007
"... Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker exploits faulty application code to execute maliciously crafted database queries. Both static and dynamic approaches have been proposed to detect or prevent SQL injections; w ..."
Abstract - Cited by 161 (5 self) - Add to MetaCart
by proposing a precise, sound, and fully automated analysis technique for SQL injection. Our technique avoids the need for specifications by considering as attacks those queries for which user input changes the intended syntactic structure of the generated query. It checks conformance to this policy

Order Preserving Encryption for Numeric Data

by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu , 2004
"... Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypte ..."
Abstract - Cited by 210 (2 self) - Add to MetaCart
on encrypted data. Query results produced are sound (no false hits) and complete (no false drops). Our scheme handles updates gracefully and new values can be added without requiring changes in the encryption of other values. It allows standard database indexes to be built over encrypted tables and can easily

Back to the future: The story of Squeak, A practical Smalltalk written in itself

by Dan Ingalls, Dan Ingalls, Ted Kaehler, Ted Kaehler, John Maloney, John Maloney, Scott Wallace, Scott Wallace, Alan Kay, Walt Disney Imagineering - In Proceedings OOPSLA ’97, ACM SIGPLAN Notices , 1997
"... Squeak is an open, highly-portable Smalltalk implementation whose virtual machine is written entirely in Smalltalk, making it easy to debug, analyze, and change. To achieve practical performance, a translator produces an equivalent C program whose performance is comparable to commercial Smalltalks. ..."
Abstract - Cited by 209 (4 self) - Add to MetaCart
Squeak is an open, highly-portable Smalltalk implementation whose virtual machine is written entirely in Smalltalk, making it easy to debug, analyze, and change. To achieve practical performance, a translator produces an equivalent C program whose performance is comparable to commercial Smalltalks

Early-onset obesity and the unwanted promise of thrombosis

by Richard C. Becker , 2011
"... Obesity is rapidly becoming a global epidemic of unpar-alleled proportions. While the initial alarm was sounded by the National Center for Health Statistics in 1994 (reviewed in Ref. [1]), changes in body mass index have accelerated rapidly in the past 5 years among children, adolescents and adults. ..."
Abstract - Add to MetaCart
Obesity is rapidly becoming a global epidemic of unpar-alleled proportions. While the initial alarm was sounded by the National Center for Health Statistics in 1994 (reviewed in Ref. [1]), changes in body mass index have accelerated rapidly in the past 5 years among children, adolescents and adults
Next 10 →
Results 1 - 10 of 7,029
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University