Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Loek Cleophas"'
Publikováno v:
South African Computer Journal, Vol 29, Iss 1 (2017)
Failure deterministic finite automata (FDFAs) represent regular languages more compactly than deterministic finite automata (DFAs). Four algorithms that convert arbitrary DFAs to language-equivalent FDFAs are empirically investigated. Three are concr
Externí odkaz:
https://doaj.org/article/55c928bf98274b9a838b1fe7815c6f36
Publikováno v:
South African Computer Journal, Vol 0, Iss 53 (2014)
In indexing of, and pattern matching on, DNA and text sequences, it is often important to represent all factors of a sequence. One efficient, compact representation is the factor oracle (FO). At the same time, any classical deterministic finite autom
Externí odkaz:
https://doaj.org/article/99ad3d8441744274bd6ef6ceca131c1b
Autor:
Victoria Bogachenkova, Eduardo Costa Martins, Jarl Jansen, Ana-Maria Olteniceanu, Bartjan Henkemans, Chinno Lavin, Linh Nguyen, Thea Bradley, Veerle Fürst, Hossain Muhammad Muctadir, Mark van den Brand, Loek Cleophas, Alexander Serebrenik
Publikováno v:
Journal of Open Source Software, 8(85):5135. Open Journals
Qualitative analysis of data is relevant for a variety of domains including empirical research studies and social sciences. While performing qualitative analysis of large textual data sets such as data from interviews, surveys, mailing lists, and cod
Publikováno v:
Science of Computer Programming, 223:102877. Elsevier
Science of Computer Programming 223 (2022)
Science of Computer Programming, 223
Science of Computer Programming 223 (2022)
Science of Computer Programming, 223
The increased popularity and adoption of model-* engineering paradigms, such as model-driven and model-based engineering, leads to an increase in the number of models, metamodels, model transformations and other related artifacts. This calls for auto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::51136fbf73004ae85ea53e2516f7a7a8
https://research.tue.nl/nl/publications/9e7730a9-a54c-473c-804b-0bc898aa661b
https://research.tue.nl/nl/publications/9e7730a9-a54c-473c-804b-0bc898aa661b
Publikováno v:
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings.
Autor:
Gökhan Kahraman, Loek Cleophas
Publikováno v:
Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B.
Publikováno v:
R.Berger, T. hebig, CEUR Workshop Proceedings, 2018 MODELS Workshops: ModComp, MRT, OCL, FlexMDE, EXE, COMMitMDE, MDETools, GEMOC, MORSE, MDE4IoT, MDEbug, MoDeVVa, ME, MULTI, HuFaMo, AMMoRe, PAINS, MODELS-WS 2018, 14 October 2018 through 19 October 2018, 6-11
Software and Systems Modeling, 19(6), 1519-1540. Springer
Pure TUe
Software and Systems Modeling, 19(6), 1519-1540. Springer
Pure TUe
High-tech companies are struggling today with the maintenance of legacy software. Legacy software is vital to many organizations as it contains the important business logic. To facilitate maintenance of legacy software, a comprehensive understanding
Publikováno v:
Theoretical Computer Science, 830-831, 60-90. Elsevier
Tree pattern matching on ordered trees is an important problem in Computer Science. Ordered trees can be represented as strings with additional properties via various linearisations. We present a backward tree pattern matching algorithm for ordered t
Autor:
Tabea Bordis, Loek Cleophas, Alexander Kittelmann, Tobias Runge, Ina Schaefer, Bruce W. Watson
Publikováno v:
The Logic of Software. A Tasting Menu of Formal Methods ISBN: 9783031081651
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4d70470b528796a266e49efd77c85a26
https://doi.org/10.1007/978-3-031-08166-8_5
https://doi.org/10.1007/978-3-031-08166-8_5
Autor:
Bruce W. Watson, Ina Schaefer, Loek Cleophas, Derrick G. Kourie, Alexander Knüppel, Tobias Runge
Publikováno v:
ACM SIGAda Ada Letters. 38:64-68
In many software applications, it is necessary to preserve confidentiality of information. Therefore, security mechanisms are needed to enforce that secret information does not leak to unauthorized users. However, most language-based techniques that