Lazy Match (Lazy Pattern Matching)


Regular expression (Lazy quantification)

Notes:

  • LMSA (Lazy Match based on Semantic Analysis)

Wikipedia:

References:

See also:

RegEx & Dialog Systems 2012


Mergeable schedules for lazy matching L De Koninck – CW Reports, 2007 – lirias.kuleuven.be This paper presents a new data structure, based on circular linked lists and the union-find algorithm, for the purpose of incremental, lazy pattern matching for rule based languages, with storage of partial matches. Our approach consists of incrementally generating a … Cited by 4 Related articles All 8 versions Cite Save

Establishing correspondences between models with the epsilon comparison language DS Kolovos – Model Driven Architecture-Foundations and …, 2009 – Springer … Fig. 2. ECL Match Trace 4.4 Rule Execution Scheduling Non-abstract, non-lazy match-rules are evaluated automatically by the execution engine in a top-down fashion – with respect to their order of appearance – in two passes. … Cited by 47 Related articles All 5 versions Cite Save

Match the virtual human model and motion data automatically. XY Hu, XH Liang, QP Zhao – Ruan Jian Xue Bao(Journal of Software …, 2006 – en.cnki.com.cn … motion data. This paper proposes an algorithm called LMSA (lazy match based on semantic analysis) which generates skeleton for existing human model and matches it to the motion data when the motion data is loaded. The … Cited by 4 Related articles All 2 versions Cite Save More

Efficient lazy evaluation of rule-based programs P Van Weert – … and Data Engineering, IEEE Transactions on, 2010 – ieeexplore.ieee.org … instances. We perform lazy matching, ie, each time an applicable rule instance is found, it is fired immediately. … algorithm. For lazy matching algorithms, reapplication prevention thus determines the worst-case memory complexity. … Cited by 15 Related articles All 9 versions Cite Save

Downstream usage control L Bussard, G Neven, FS Preiss – Policies for Distributed …, 2010 – ieeexplore.ieee.org … consumer. We refer to the next section for more details on lazy matching. When … process. C. Lazy Matching In the previous section we focused on proactive matching, ie, matching where all downstream policies are known beforehand. It … Cited by 17 Related articles All 6 versions Cite Save

Warnings for pattern matching L Maranget – Journal of Functional Programming, 2007 – Cambridge Univ Press Page 1. JFP: page 1 of 35. c 2007 Cambridge University Press doi:10.1017/ S0956796807006223 1 Warnings for pattern matching LUC MARANGET Inria Rocquencourt, BP 105, 78153 Le Chesnay Cedex, France (e-mail: Luc.Maranget@inria.fr) Abstract … Cited by 18 Related articles All 12 versions Cite Save

Compiling Constraint Handling Rules with lazy and concurrent search techniques M Sulzmann, ES Lam – Proceeding of Fourth Workshop …, 2007 – chr2007.workshops.free.fr … branches of the tree concurrently. In this section, we present an alternative to the lazy match search of Section 4: concurrent matching searching. … Yet to the best of our knowledge, we are the first to explicitly explore concurrent and lazy match search techniques. … Cited by 7 Related articles All 9 versions Cite Save More

Parallel execution of multi-set constraint rewrite rules M Sulzmann, ESL Lam – Proceedings of the 10th international ACM …, 2008 – dl.acm.org … There are again two possible ap- proaches: Eager [4] and lazy matching [3]. The first approach finds 1 At the moment, 2 cores are standard and 4 cores become more frequent. … Table 1. Goal-based lazy match rewrite algorithm for ground CHR all matches. … Cited by 14 Related articles All 7 versions Cite Save

Dynamic task generation and transformation within a nestable workpool skeleton S Priebe – Euro-Par 2006 Parallel Processing, 2006 – Springer … Therefore delayed matching (via the lazy matching operator ~ or selection functions head and tail) and the earliest possible production of results should be used. – Transformation often means combination or comparison which implies searching the task pool. … Cited by 15 Related articles All 4 versions Cite Save

Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage L Bussard, G Neven, FS Preiss – Privacy and Identity Management for Life, 2011 – Springer … Such scenarios require another matching algorithm: “lazy matching” (See Section 17.5.3). Matching non-recursive (but possibly nested) downstream usage authorisations is done by checking whether the specified ACUC restrictions match: … Cited by 2 Related articles All 2 versions Cite Save

Zlib compression library J Gailly, M Adler – 2004 – repository.cam.ac.uk … To improve overall compression, the compressor optionally defers the selection of matches (“lazy matching”): after a match of length N has been found, the compressor searches for a longer match starting at the next input byte. … Cited by 12 Related articles Cite Save

Guest Editors’ Introduction: Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments J Dix, N Bassiliades, G Governatori… – IEEE Transactions on …, 2010 – computer.org … It proposes a combination and cross-fertilization of the LEAPS production rule lazy matching algorithm (an extension to the Rete algorithm) with Constraint Handling Rules (CHR), a high-level, declarative programming language, similar to production rules. … Cited by 2 Related articles All 2 versions Cite Save

A Mobile Reasoning System for Supporting the Monitoring of Chronic Diseases A Minutolo, M Esposito, G De Pietro – Wireless Mobile Communication and …, 2012 – Springer … stacks. After that, the LPM determines the new active rules with a non-empty stack, selects one of them and restarts the research of its rule activations. The whole lazy matching procedure is summarized in figure 3. Pop from … Cited by 9 Related articles All 2 versions Cite Save

Optimizing compilation of CHR with rule priorities L De Koninck, PJ Stuckey, GJ Duck – Functional and Logic Programming, 2008 – Springer … closely. This refinement, called the re- fined priority semantics and denoted by ?rp, is based on the refined operational semantics ?r of (regular) CHR and is thus also based on lazy matching and the concept of active constraints. … Cited by 13 Related articles All 14 versions Cite Save

Lazy AC-pattern matching for rewriting W Belkhir, A Giorgetti – arXiv preprint arXiv:1204.5543, 2012 – arxiv.org … The system Lazy is not confluent, due to the non-confluence of ?3. In this section we argue that the system ?1 ??2 is confluent, and we consider an evaluation strategy for ?3 to get a confluent AC-lazy matching system, that we call Lazy? . … Cited by 2 Related articles All 7 versions Cite Save

Argus: Rete+ dbms= efficient persistent profile matching on large-volume data streams C Jin, J Carbonell, P Hayes – Foundations of Intelligent Systems, 2005 – Springer … monitor working memory for the incremental formation of tuple instantiations. LEAPS [14] is a lazy matching scheme that collapses the space complexity required by Rete to linear. A generalization of Rete and TREAT, Gator [9] is a … Cited by 12 Related articles All 18 versions Cite Save

Optimized compilation of CHRrp L De Koninck, PJ Stuckey, GJ Duck – CW Reports, volume CW499, 2007 – cs.kuleuven.be … closely. This refinement, called the re- fined priority semantics and denoted by ?rp, is based on the refined operational semantics ?r of (regular) CHR and is thus also based on lazy matching and the concept of active constraints. … Cited by 6 Related articles All 8 versions Cite Save More

A semantic joint-based NURBS human body model for motion capture data X Wei, B Xiao, Q Zhang, C Zhou – International Journal of Innovative …, 2009 – ijicic.org … To match the virtual human model and motion data automatically, Hu et al. [2] put forward a novel algorithm called LMSA(lazy match based on semantic analysis)which generated skeleton for existing human model and matched it to the motion data. … Cited by 2 Related articles All 2 versions Cite Save More

A lazy evaluation approach for mobile reasoning in DSSs A Minutolo, M Esposito… – … Intelligence and Informatics …, 2011 – ieeexplore.ieee.org Page 1. A Lazy Evaluation Approach for Mobile Reasoning in DSSs A. Minutolo*, **, M. Esposito* and G. De Pietro* * Institute for High Performance Computing and Networking, ICAR-CNR, Via P. Castellino, 111-80131, Napoli … Cited by 1 Related articles All 2 versions Cite Save

Stochastic propositionalization for efficient multi-relational learning N Di Mauro, TMA Basile, S Ferilli, F Esposito – Foundations of Intelligent …, 2008 – Springer … 2.2 Covering Examples In the classical ILP setting, generalizations are evaluated on the training exam- ples using the ?-subsumption as a covering procedure. Here, the covering test is based on a syntactic lazy matching more efficient than the ?-subsumption. … Cited by 2 Related articles All 10 versions Cite Save

A Framework for Lazy Parallel Evaluation of Equational Programs RC Sekary, S Pawagi, IV Ramakrishnan – Citeseer … We have so far described three notions of sequentiality: path sequentiality, which is based on ability to perform (lazy) matching based on independent traversal of paths; strong left-sequentiality which is based on preorder traversal; and strong sequentiality which is based on … Cited by 1 Related articles All 5 versions Cite Save More

FPGA implementation of GZIP compression and decompression for IDC services J Ouyang, H Luo, Z Wang, J Tian… – Field-Programmable …, 2010 – ieeexplore.ieee.org … the original 1/16. 3. Search_match: As shown in Figure 6, this module supports 4-way concurrent matching and searching in each cycle, and it supports the lazy matching to improve the compression ratio. B. FPGA-based GZIP … Cited by 1 Related articles All 2 versions Cite Save

Demand-driven Normalisation for ACD Term Rewriting L De Koninck, GJ Duck, PJ Stuckey – Logic Programming, 2009 – Springer … Therefore, we take a safe approach and normalise the term. While this deviates from lazy matching, there is no unique lazy way in general to match with nonlinear variables anyway: we can apply rewrites to any of the terms being matched in case they are not Page 4. … Related articles All 12 versions Cite Save

Extension and Implementation of CHR P Van Weert – Logic Programming, 2007 – Springer … in programs.” Clearly, the inherently parallel CHR language provides a valid so- lution [5]. The parallelization of forward chaining rule-based systems has never been fully successful in the past [2]. I believe the key to effective parallel match- ing is lazy matching, especially when … Related articles All 6 versions Cite Save

Concurrent goal-based execution of constraint handling rules ESL Lam, M Sulzmann – TPLP, 2011 – Cambridge Univ Press … issue. Lazy matching and asynchronous goal execution: When executing goals, we lazily compute only matches that contain the specific goal and immediately apply such matches without concerning any further matches. For … Cited by 7 Related articles All 10 versions Cite Save

MPISE: Symbolic Execution of MPI Programs X Fu, Z Chen, Y Zhang, C Huang, J Wang – arXiv preprint arXiv:1403.4813, 2014 – arxiv.org … an on-the-fly scheduling algorithm, which can reduce unnecessary inter- leaving explorations while ensuring the soundness and completeness; secondly, when attacking the non-determinism caused by wildcard receives, we propose a technique, called lazy matching, to avoid … Cite Save

Tuning Parallelism of Sequential Applications via Thread Level Speculation for Chip Multiprocessors C Liu, L Shen, L Huang, Z Wang… – Advanced Science …, 2012 – ingentaconnect.com … Eliminate dependences vv v v v High-level parallel v v v – – Synchronization × × × v × 3) The lazy match is subject to compression level from 1 to 9. The appearance of violations due to “level” provides some hints that we can also do it in compression level aspect. … Related articles All 2 versions Cite Save

User-definable rule priorities for CHR L De Koninck, T Schrijvers, B Demoen – Proceedings of the 9th ACM …, 2007 – dl.acm.org Page 1. User-definable Rule Priorities for CHR Leslie De Koninck * Tom Schrijvers † Bart Demoen Katholieke Universiteit Leuven, Department of Computer Science Celestijnenlaan 200a, 3001 Heverlee, Belgium FirstName.LastName @cs.kuleuven.be … Cited by 42 Related articles All 4 versions Cite Save

Object oriented real time asynchronous production systems SP Tolety – 2011 – 210.212.129.140 … Page 5. Bibliography 161 [54] DP Miranker, DA Brant, B. Lofaso, and D. Gadbois. On the performance of lazy matching in production systems. In Proceedings of National Conjtn.nct on Artificial Intelligence AAAI-90, pages 685-692, 1990. [55] WK Nelson. … Related articles All 4 versions Cite Save

The Scala language specification M Odersky, P Altherr, V Cremet, B Emir, S Micheloud… – 2004 – cs.olemiss.edu … abstract case catch class def do else extends false final finally for forSome if implicit import lazy match new null object override package private protected return sealed super this throw trait try true type val var while with yield _ : = => < … Cited by 126 Related articles All 43 versions Cite Save More

Second research report on next generation policies P Samarati, SS TUD – 2010 – primelife.ercim.eu … 34 2.3.1 Matching privacy preferences and policies . . . . . 34 2.3.2 Proactive matching of downstream rights . . . . . 36 2.3.3 Lazy matching . . . . . 37 2.4 Future research . . . . . … Related articles Cite Save More

The Compressed X. 509 Certificate Format M Pritikin, D McGrew – 2010 – tools.ietf.org … via LZ77. A DEFLATE encoder can use a “lazy matching” strategy, in which several different partitions of the input data into distinct blocks are tried, and the partition that leads to the most compact output is used. The DEFLATE … Cite Save More

Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages J Schafer, D Klein – … Conference (VTC Spring), 2013 IEEE 77th, 2013 – ieeexplore.ieee.org … IEEE Computer Society, 1990, pp. 353–360. [28] DP Miranker, DA Brant, B. Lofaso, and D. Gadbois, “On the performance of lazy matching in production systems,” in Proceedings of the eighth National conference on Artificial intelligence – Volume 1, ser. AAAI’90. … Cited by 1 Related articles Cite Save

A symbolic transformation language and its application to a multiscale method W Belkhir, A Giorgetti, M Lenczner – Journal of Symbolic Computation, 2014 – Elsevier The context of this work is the design of a software, called MEMSALab, dedicated to the automatic derivation of multiscale models of arrays of micro- and nanosy. Cited by 2 Related articles All 7 versions Cite Save

The computational power and complexity of Constraint Handling Rules J Sneyers, T Schrijvers, B Demoen – ACM Transactions on Programming …, 2009 – dl.acm.org Page 1. 8 The Computational Power and Complexity of Constraint Handling Rules JON SNEYERS, TOM SCHRIJVERS, and BART DEMOEN KULeuven Constraint Handling Rules (CHR) is a high-level rule-based programming … Cited by 36 Related articles All 11 versions Cite Save

MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching H Wang, S Pu, G Knezek, JC Liu – Parallel and Distributed …, 2013 – ieeexplore.ieee.org … Based on the lazy matching model, the matching engine in [15] will pick up option 1 and follow the searching path of {“ab,” “c-1,” “-_3d”}, which leads to the incorrect conclusion that the example string cannot match R2 because “-_3d” is not acceptable to CCR3. … Cited by 3 Related articles All 5 versions Cite Save

An Optimized R5RS Macro Expander S Reque – 2013 – Citeseer Page 1. An Optimized R5RS Macro Expander Sean Reque A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Science Jay McCarthy, Chair Eric Mercer Quinn Snell Department of Computer Science … Cited by 1 Related articles All 3 versions Cite Save More

The computational power and complexity of Constraint Handling Rules J Sneyers, T Schrijvers, B Demoen – CHR2005, 2005 – researchgate.net Page 1. The Computational Power and Complexity of Constraint Handling Rules JON SNEYERS, TOM SCHRIJVERS and BART DEMOEN KULeuven, Belgium Constraint Handling Rules (CHR) is a high-level rule-based programming … Cited by 56 Related articles All 16 versions Cite Save More

Approximate reasoning for efficient anytime induction from relational knowledge bases N Di Mauro, TMA Basile, S Ferilli, F Esposito – Scalable Uncertainty …, 2008 – Springer … 3.4 Approximate Model Validation The model validation we adopt in the proposed framework to assess and exploit the generated model on the seen and unseen data is based on a syntactic lazy matching. Corollary 1 (Subsumption). … Cited by 1 Related articles All 10 versions Cite Save

Two-pass greedy regular expression parsing NBB Grathwohl, F Henglein, L Nielsen… – … and Application of …, 2013 – Springer … The name comes from treating the Kleene star E ? as E × E ? + 1, which “greed- ily” matches E against the input as many times as possible. A “lazy” matching Page 5. 64 NBB Grathwohl et al. interpretation of E ? corresponds to treating E ? as 1+E ×E ? . (In practice, mul- … Cited by 2 Related articles All 9 versions Cite Save

[BOOK] Introducing regular expressions M Fitzgerald – 2012 – books.google.com Page 1. v n 11,!//Z//J V, /u?/ @ ..L M kw W S; H .w 5 S W X E T M W0 Q R M6 d U m H U Introducing C)’RE|LLY® Michael Fitzgerald Page 2. Unraveling Regular Expressions, Step-by-Step r M U we R Introducing Expressbns O’RElLLY® Micl0ozelFitzgeral0l Page 3. … Cited by 1 Related articles All 7 versions Cite Save

Verifying Bounds on Deliberation Time in Multi-Agent Systems. N Alechina, B Logan – EUMAS, 2005 – cs.nott.ac.uk … AAAI Press, 1987. [17] Daniel P. Miranker, David A. Brant, Bernie Lofaso, and David Gadbois. On the performance of lazy matching in production systems. In Proceedings of the Eighth National Conference on Artificial Intelligence, pages 685–692. AAAI Press, 1990. … Cited by 4 Related articles All 5 versions Cite Save More

Production systems and Rete algorithm formalisation H Cirstea, C Kirchner, MM Moossen, PE Moreau – 2004 – hal.inria.fr Page 1. Méta-compilation non intrusive du filtrage par contraintes Non intrusive meta-compilation of matching by constraints Sous Projet 1 RETE et r´e´ecriture Production Systems and Rete Algorithm Formalisation Description … Cited by 12 Related articles All 4 versions Cite Save

Approximate relational reasoning by stochastic propositionalization N Di Mauro, TMA Basile, S Ferilli, F Esposito – Advances in Intelligent …, 2010 – Springer … The model valida- tion we adopt in the proposed framework to assess and exploit the generated model on the seen and unseen data is based on a syntactic lazy matching, as proved [9] in the following Corollary. Corollary 1 (Subsumption). … Cited by 4 Related articles All 6 versions Cite Save

Production and rewrite systems H Cirstea, C Kirchner, MM Moossen, PE Moreau – 2004 – hal.archives-ouvertes.fr Page 1. Méta-compilation non intrusive du filtrage par contraintes Non intrusive meta-compilation of matching by constraints Sous Projet 1 RETE et r´e´ecriture Production and Rewrite Systems Description : This report studies … Cited by 2 Related articles All 3 versions Cite Save

Logical Algorithms meets CHR: A meta-complexity result for Constraint Handling Rules with rule priorities. L De Koninck – TPLP, 2009 – Cambridge Univ Press Page 1. TLP 9 (2): 165–212, 2009. C 2009 Cambridge University Press doi:10.1017/ S1471068409003664 First published online 10 February 2009 Printed in the United Kingdom 165 Logical Algorithms meets CHR: A meta-complexity result for Constraint … Cited by 9 Related articles All 9 versions Cite Save

Efficiency issues of Rete-based expert systems for misuse detection M Meier, U Flegel, S Schmerl – Computer Security Applications …, 2007 – ieeexplore.ieee.org Page 1. Efficiency Issues of Rete-based Expert Systems for Misuse Detection Michael Meier, Ulrich Flegel University of Dortmund Department of Computer Science D-44221 Dortmund, Germany michael.meier, ulrich.flegel@udo.edu … Cited by 2 Related articles All 20 versions Cite Save

Scenario-based Evaluation of Privacy-enhancing Service Composition Solution S Short – 2011 – primelife.ercim.eu … Origin in the user’s preferences the sticky policy will be matched each time before the data is communicated to a new service. The demonstrator supports both PPL’s normal matching and “lazy matching”. In case of mismatch the transaction is ended. No Requirement Achieved … Cite Save More

Execution control for Constraint Handling Rules L De Koninck – 2008 – repository.libis.kuleuven.be … Chapter 2 is mostly based on preliminaries of the publications that are the basis for the later chapters. Furthermore, Section 2.3 is taken from De Koninck, L. 2007. Mergeable schedules for lazy matching. Tech. Rep. CW 505, Department of Computer Science, KULeuven. … Cited by 10 Related articles Cite Save

[BOOK] Regular Expression Recipes for Windows Developers: A Problem-solution Approach N Good – 2005 – books.google.com Page 1. THE EXPERTS VOICE® R 6 Ci p B S for W i “do ‘3’ Developers ‘ ‘ ‘ A Problem-Solution Approach Regular Expressions for .NE I VBScript, C#, and more! Nathan A. Good Apress® Page 2. Page 3. Regular Expression Recipes … Cited by 2 Related articles All 4 versions Cite Save

Compressing Medical Records for Storage on a Low-End Mobile Phone P Brittan – people.cs.uct.ac.za Page 1. ~ i ~ Supervised By: Sonia Berman, Gary Marsden & Anne Kayem Department of Computer Science University of Cape Town 2011 Honours Project Report Compressing Medical Records for Storage on a Low-End Mobile Phone Paul Brittan pbrittan@cs.uct.ac.za … Related articles All 2 versions Cite Save More

Definition and Application of a GenVoca Component Description L Warshaw, DP Miranker, KS Ulrich – Citeseer Page 1. – 1- Definition and Application of a GenVoca Component Description Language * Lane Warshaw, Daniel P. Miranker and Kenneth S. Ulrich Department of Computer Sciences University of Texas at Austin Austin, Texas … Related articles All 2 versions Cite Save More

CHR for imperative host languages P Van Weert, P Wuille, T Schrijvers… – Constraint Handling Rules, 2008 – Springer Page 1. CHR for Imperative Host Languages Peter Van Weert ? , Pieter Wuille, Tom Schrijvers ?? , and Bart Demoen Department of Computer Science, KULeuven, Belgium FirstName.LastName@cs.kuleuven.be Abstract. In … Cited by 15 Related articles All 11 versions Cite Save

Notification Oriented Paradigm (NOP) and Imperative Paradigm: A Comparative Study. JM Simão, CA Tacla, PC Stadzisz… – Journal of Software …, 2012 – search.ebscohost.com Page 1. Journal of Software Engineering and Applications, 2012, 5, 402-416 doi:10.4236/jsea. 2012.56047 Published Online June 2012 (http://www.SciRP.org/journal/jsea) Notification Oriented Paradigm (NOP) and Imperative Paradigm: A Comparative Study … Cited by 6 Related articles All 4 versions Cite Save

Execution Control for Constraint Handling Rules (Uitvoeringscontrole voor Constraint Handling Rules) L De Koninck – status: published, 2008 – lirias.kuleuven.be … Chapter 2 is mostly based on preliminaries of the publications that are the basis for the later chapters. Furthermore, Section 2.3 is taken from De Koninck, L. 2007. Mergeable schedules for lazy matching. Tech. Rep. CW 505, Department of Computer Science, KULeuven. … Related articles Cite Save

Execution Control for Constraint Handling Rules B DEMOEN, L DE KONINCK – 2008 – cs.kuleuven.be … Chapter 2 is mostly based on preliminaries of the publications that are the basis for the later chapters. Furthermore, Section 2.3 is taken from De Koninck, L. 2007. Mergeable schedules for lazy matching. Tech. Rep. CW 505, Department of Computer Science, KULeuven. … Related articles All 5 versions Cite Save More

Notification Oriented and Object Oriented Paradigms Comparison via Sale System. JM Simão, DL Belmonte, AF Ronszcka… – Journal of Software …, 2012 – search.ebscohost.com Page 1. Journal of Software Engineering and Applications, 2012, 5, 695-710 doi:10.4236/jsea. 2012.59083 Published Online September 2012 (http://www.SciRP.org/journal/jsea) 695 Notification Oriented and Object Oriented Paradigms Comparison via Sale System … Cited by 2 Related articles All 4 versions Cite Save

[BOOK] Programming Scala: Scalability= Functional Programming+ Objects D Wampler, A Payne – 2009 – books.google.com Page 1. — Scalability = Functional Programming + Objects Programming ‘ I ‘I v uy will“? 4, , O’RE||_LY® Dean Wampler 6} Alex Payne Page 2. — Scalability = F a r-zclional Program-2m z’rzg + Objects Programming CD’RElLLY® Dean Wampler 6} Alex Payne Page 3. … Cited by 45 Related articles All 3 versions Cite Save

To CHR¬ or not to CHR¬: Extending CHR with negation as absence P Van Weert, J Sneyers, T Schrijvers… – CW Reports, volume …, 2006 – jotun.cs.kuleuven.be Page 1. To CHR ¬ or not to CHR ¬ : Extending CHR with Negation as Absence Peter Van Weert Jon Sneyers Tom Schrijvers Bart Demoen Report CW 446, May 2006 Katholieke Universiteit Leuven Department of Computer Science … Cited by 3 Related articles All 9 versions Cite Save More

Operational Semantics of Ltac W Jedynak – ii.uni.wroc.pl … 58 7.4 Natural semantics – expression evaluation . . . . . 59 7.5 Natural semantics – lazy match goal . . . . . 64 8.1 Abstract machine – expression evaluation and tactic execution 70 8.2 Abstract machine – function application . . . . . … Related articles Cite Save More

Practical Perl Programming B Jurish – kaskade.dwds.de Page 1. Practical Perl Programming Universität Potsdam, Institut für Linguistik Wintersemester 2004-2005 Bryan Jurish moocow@ling.uni-potsdam.de Page 2. CONTENTS WS 2004-05 / Jurish Contents 1 Course Syllabus 5 2 Administrivia 6 2.1 Prerequisites . . . . . … Related articles All 2 versions Cite Save More

A Game Comparative Study: Object-Oriented Paradigm and Notification-Oriented Paradigm. JM Simão, DL Belmont, GZ Valença… – Journal of Software …, 2012 – search.ebscohost.com Page 1. Journal of Software Engineering and Applications, 2012, 5, 722-736 doi:10.4236/jsea. 2012.59085 Published Online September 2012 (http://www.SciRP.org/journal/jsea) A Game Comparative Study: Object-Oriented Paradigm and Notification-Oriented Paradigm … Cited by 2 Related articles All 4 versions Cite Save

Structured generic programming in Eden. S Priebe – 2007 – Citeseer Page 1. Structured Generic Programming in Eden Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften (Dr. rer. nat.) dem Fachbereich Mathematik und Informatik der Philipps-Universität Marburg vorgelegt von Steffen Priebe aus Marburg/Lahn … Cited by 1 Related articles All 2 versions Cite Save More

Extension and Optimising Compilation of Constraint Handling Rules (Uitbreiding en optimaliserende compilatie van constraint handling rules) P Van Weert – status: published, 2010 – lirias.kuleuven.be Page 1. Arenberg Doctoral School of Science, Engineering & Technology Faculty of Engineering Department of Computer Science EXTENSION AND OPTIMISING COMPILATION OF CONSTRAINT HANDLING RULES Peter VAN WEERT … Related articles Cite Save

Extension And Optimising Compilation Of Constraint Handling Rules P VAN WEERT – 2010 – Citeseer Page 1. Arenberg Doctoral School of Science, Engineering & Technology Faculty of Engineering Department of Computer Science EXTENSION AND OPTIMISING COMPILATION OF CONSTRAINT HANDLING RULES Peter VAN WEERT … Related articles Cite Save More

[BOOK] Grep pocket reference J Bambenek, A Klus – 2009 – books.google.com Page 1. The Basicsfor an Essential Unix Content-Location Utility W1 . Fitz/1’4 ll! uHI-(IQ/L. . fl! ® john Bambenele é; Agnz’esz/ea Klus Page 2. The Basicsfor an Essential [Mix Content-Location Urilz’zjy john Bcm’zbenek é Agm’eszka Klus Page 3. … Cited by 6 Related articles All 5 versions Cite Save

Infrastructure for Privacy for Life K Wouters – 2011 – primelife.ercim.eu Page 1. Privacy and Identity Management in Europe for Life Infrastructure for Privacy for Life Editors: Ulrich Pinsdorf (EMIC) Reviewers: Dieter Sommer (IBM) Karel Wouters (KULeuven) Identifier: D6.3.2 Type: Deliverable Version: 1.0 Class: Public Date: January 31, 2011 … Related articles Cite Save More

R++: Adding Path-Based Rules to C+ JM Crawford, D Dvorak, DJ Litman, A Mishra… – ect.bell-labs.com Page 1. R++: Adding Path-Based Rules to C++ James M. Crawford i2 Technologies Daniel Dvorak Jet Propulsion Laboratory Diane J. Litman AT&T Labs – Research Anil Mishra AT&T Network and Computing Services Peter F. Patel-Schneider AT&T Labs – Research Abstract … Related articles All 12 versions Cite Save More

Optimal parsing in dictionary-symbolwise compression algorithms A Langiu, A Restivo – math.unipa.it … similar to this one. Deflate’s Greedy Solution: Lazy Matching To improve overall compression, the compressor optionally defers the selection of matches (”lazy matching”): after a match of length N has been found, the com- pressor … Cited by 1 Related articles Cite Save More

A Coq Formalization of the Relational Data Model V Benzaken, É Contejean, S Dumbrava – ESOP-23rd European Symposium …, 2014 – lri.fr Page 1. A Coq Formalization of the Relational Data Model? Véronique Benzaken1, Évelyne Contejean2, and Stefania Dumbrava1 1 Université Paris Sud, LRI, France 2 CNRS, LRI, Université Paris Sud, France Abstract. In this … Related articles All 3 versions Cite Save More

[BOOK] Signal Processing for Neuroscientists, A Companion Volume: Advanced Topics, Nonlinear Techniques and Multi-Channel Analysis W Van Drongelen – 2010 – books.google.com Page 1. WEB APPLICATION Darusc/mom ‘~/WAFs..Evasi0n..Filters//alert(/Obfuscation/)-‘ Mario Heiderich, / \ Eduardo Albedo Vela Nava, Gareth Heyes, David Lindsay Page 2. WEB APPLICATION UBFUSCATION ‘-/WAFs..Evasi0n … Cited by 4 Related articles All 2 versions Cite Save

[BOOK] Web Application Obfuscation:-/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- EAV Nava, G Heyes, D Lindsay – 2011 – books.google.com Page 1. WEB APPLICATION Darusc/mom ‘~/WAFs..Evasi0n..Filters//alert(/Obfuscation/)-‘ Mario Heiderich, / \ Eduardo Albedo Vela Nava, Gareth Heyes, David Lindsay Page 2. WEB APPLICATION UBFUSCATION ‘-/WAFs..Evasi0n … Cited by 7 Related articles All 4 versions Cite Save

[BOOK] Programming for linguists: Perl for language researchers M Hammond – 2008 – books.google.com Page 1. Programming for Linguists Language Researchers )~” Page 2. Programming for Linguists: Perl for Language Researchers Michael Hammond Page 3. Allie Page 4. Programming for Linguists Page 5. Allie Page 6. Programming … Cited by 20 Related articles All 4 versions Cite Save

[BOOK] Beginning regular expressions A Watt – 2005 – books.google.com … Current HeadContents Modes 262 Character Classes 265 Back References 265 Lookahead and Lookbehind 265 Lazy Matching versus Greedy Matching 265 Examples 268 Character Class Examples, Including Ranges 268 Whole Word Searches 269 Search-and-Replace … Cited by 20 Related articles All 5 versions Cite Save

An approach to adaptive inference engine for rule-based consultation systems PC Chinh – 2006 – duepublico.uni-duisburg-essen.de Page 1. An approach to adaptive inference engine for rules-based consultation systems Page 2. An approach to adaptive inference engine for rule-based consultation systems Von der Fakultät Ingenieurwissenschaften der Universität Duisburg-Essen … Related articles All 2 versions Cite Save More

KU Leuven JCHR User’s Manual P Van Weert – 2006 – dtai.cs.kuleuven.be Page 1. KULeuven JCHR User’s Manual Peter Van Weert Draft Version (December 5, 2006) Page 2. Contents 1 Introduction 3 1.1 About the K.U.Leuven JCHR System . . . . . 3 Disclaimer . . . . . 3 1.1.1 Compared to other CHR sytems . . . . . … Cited by 2 Related articles All 2 versions Cite Save More

[BOOK] ActionScript 3.0 Bible R Braunstein – 2010 – books.google.com Page 1. Companion Web site ~ Additional information ~ Examples, useful links, and more Roger Braunstein Action~S cript” 3.0 ~ Second Edition Develop for web and mobile devices Enhance desktop apps with HD Video and 3D Write AS3 for use with AIR“, Flex”, and Flash“ __ … Cited by 22 Related articles All 7 versions Cite Save

[BOOK] Privacy and identity management for life J Camenisch, S Fischer-Hübner, K Rannenberg – 2011 – books.google.com … 321 17.5.1 Structure of Downstream Authorisations . . . . . 322 17.5.2 Proactive Matching of Downstream Data Handling . . . . . 323 17.5.3 Lazy Matching of Downstream Data Handling . . . . . 324 Conclusion . . . . . … Cited by 17 Related articles All 7 versions Cite Save

Optimizing secure communication standards for disadvantaged networks SH Okano, R Khazan, J Cooley, B Fuller – 2009 – DTIC Document Page 1. Optimizing Secure Communication Standards for Disadvantaged Networks* Stephen Okano, Roger Khazan, Joseph Cooley, Benjamin Fuller Information Systems Technology Group MIT Lincoln Laboratory 244 Wood … Related articles All 8 versions Cite Save

Rule-Based Query Optimization, Revisited LBWDP Miranker, T Hall – Citeseer Page 1. Rule-Based Query Optimization, Revisited * Lane B. Warshaw Daniel P. Miranker Department of Computer Sciences and The Applied Research Laboratories The University of Texas at Austin Taylor Hall 2.124 Austin … Related articles All 13 versions Cite Save More

Consistency in the World Wide Web: Specification, Verification, and Evaluation JG Thomsen – 2013 – pure.au.dk Page 1. Consistency in the World Wide Web: Specification, Verification, and Evaluation Ph.D. Dissertation Jakob Grauenkjær Thomsen Supervisors: Erik Ernst & Claus Brabrand Department of Computer Science Aarhus University Denmark Page 2. Page 3. … Related articles All 3 versions Cite Save More

Energy-efficient Secure Embedded Systems P Mishra, R Adviser-Karri – 2004 – Citeseer Page 1. Energy-efficient Secure Embedded Systems DISSERTATION For the degree of DOCTOR OF PHILOSOPHY (Electrical Engineering) Piyush Mishra May 2004 Page 2. Page 3. Energy-efficient Secure Embedded Systems DISSERTATION Submitted in Partial Fulfillment … Related articles All 2 versions Cite Save More

Large text compression benchmark M Mahoney – URL: http://www. mattmahoney. net/text/text. html, 2009 – mattmahoney.net Large Text Compression Benchmark. Matt Mahoney Last update: June 1, 2011. history. This competition ranks lossless data compression programs by the compressed size (including the size of the decompression program) of … Cited by 11 Related articles All 2 versions Cite Save More

Minimizing Information Disclosure in Authentication Transactions with Attribute-Based Credentials (Minimalisatie van vrijgegeven informatie in authenticatietransacties … FS Preiss – 2012 – lirias.kuleuven.be Page 1. Arenberg Doctoral School of Science, Engineering & Technology Faculty of Engineering Department of Computer Science Minimizing Information Disclosure in Authentication Transactions with Attribute-Based Credentials Franz-Stefan PREISS … Related articles Cite Save