We present λ re , a minimal functional calculus with regular expression types for strings, in order to establish a theoretical foundation of using regular expressions as types of strings in text processing languages....
We present λ re , a minimal functional calculus with regular expression types for strings, in order to establish a theoretical foundation of using regular expressions as types of strings in text processing languages. The major technical novelties in this paper (with respect to other work such as XDuce) are (1) the use of regular expression effects to statically analyze the shape of the output of an even diverging program and (2) the treatment of as -patterns in non-tail positions. We expect that our approach will be of help for bringing the merits of static typing into scripting languages such as Perl, Python, and Ruby without sacrificing too much of their expressiveness and flexibility.
Due to a widely use of XML language in various application domains, a well-established mechanism for the definition and enforcement of security controls on specific accesses to XML documents is demanded, in order to e...
详细信息
In order to utilize the real world via computers by means of camera images in augmented reality systems, the concise coordinate information of the systems must be identified. Image-based approaches are promising for t...
详细信息
In order to utilize the real world via computers by means of camera images in augmented reality systems, the concise coordinate information of the systems must be identified. Image-based approaches are promising for this purpose since they provide direct mapping from the camera images to the coordinate system for virtual objects, and therefore, no camera calibration is necessary. However, the conventional image-based markers are typically stickers, and the information they deliver is limited and susceptible to change dynamically. In this paper, we propose a location marking method, called VCC (visual computer communication), which uses more intelligent markers. In our method, a marker, consisting of 16 LEDs (light-emitting diodes), keeps blinking to provide both coordinate information and attached information such as an address or a URL.
The aim of this article is to introduce a new class SO(2)-equivariant transversal maps TR(cl(Ω),∂Ω) and to define degree theory for such maps. We define degree for SO(2)-equivariant transversal maps and prove some p...
详细信息
The aim of this article is to introduce a new class SO(2)-equivariant transversal maps TR(cl(Ω),∂Ω) and to define degree theory for such maps. We define degree for SO(2)-equivariant transversal maps and prove some properties of this invariant. Moreover, we characterize SO(2)-equivariant transversal isomorphisms and derive formula for degree of such isomorphisms.
Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the im...
详细信息
ISBN:
(纸本)0889863490
Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.
In this paper, we find collisions for the first and third passes of 3-pass HAVAL (following HAVAL) which is not using the second pass and not successive two passes. To find a collision in HAVAL, we introduce the schem...
详细信息
In this paper, we find collisions for the first and third passes of 3-pass HAVAL (following HAVAL) which is not using the second pass and not successive two passes. To find a collision in HAVAL, we introduce the scheme of *** et al.
In this paper, we deal with an extended class of flexible shop scheduling problems, and consider a solution under the condition in which information on jobs to be processed may not be given beforehand, i.e., under the...
详细信息
ISBN:
(纸本)0780383524
In this paper, we deal with an extended class of flexible shop scheduling problems, and consider a solution under the condition in which information on jobs to be processed may not be given beforehand, i.e., under the framework of real-time scheduling. To realize a solution, we apply such a method where jobs are to be dispatched by applying a set of rules (rule-set), and propose an approach in which a rule-set is generated and improved by using the genetics-based machine learning technique. Through some computational experiments, the effectiveness and the potential of the proposed approach are investigated.
This is a continuation of our previous results (Y. Watanabe, N. Yamamoto, T. Nakao, and T. Nishida, “A Numerical Verification of Nontrivial Solutions for the Heat Convection Problem,” to appear in the Journal of Mat...
This is a continuation of our previous results (Y. Watanabe, N. Yamamoto, T. Nakao, and T. Nishida, “A Numerical Verification of Nontrivial Solutions for the Heat Convection Problem,” to appear in the Journal of Mathematical Fluid Mechanics). In that work, the authors considered two-dimensional Rayleigh-Bénard convection and proposed an approach to prove existence of steady-state solutions based on an infinite dimensional fixed-point theorem using a Newton-like operator with spectral approximation and constructive error estimates. We numerically verified several exact nontrivial solutions which correspond to solutions bifurcating from the trivial solution. This paper shows more detailed results of verification for given Prandtl and Rayleigh numbers. In particular, we found a new and interesting solution branch which was not obtained in the previous study, and it should enable us to present important information to clarify the global bifurcation structure. All numerical examples discussed are take into account of the effects of rounding errors in the floating point computations.
Kobayashi proposed Horn clause computation by DNA molecules, which is more suitable for expressing complex algorithms than other models for DNA computing. This paper describes a new implementation of Horn clause compu...
详细信息
In this paper, we introduce the notion of proof animation, which is a new application of the principle of "Curry-Howard isomorphism" to formal proof development. Logically, proof animation is merely a contra...
详细信息
暂无评论