Sciweavers

81 search results - page 16 / 17
» A theory of typed coercions and its applications
Sort
View
IH
1999
Springer
13 years 9 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
HT
2010
ACM
13 years 7 months ago
Analysis of graphs for digital preservation suitability
We investigate the use of autonomically created small-world graphs as a framework for the long term storage of digital objects on the Web in a potentially hostile environment. We ...
Charles L. Cartledge, Michael L. Nelson
WSC
2000
13 years 6 months ago
Input modeling using a computer algebra system
Input modeling that involves fitting standard univariate parametric probability distributions is typically performed using an input modeling package. These packages typically fit ...
Diane L. Evans, Lawrence Leemis
CGF
2008
84views more  CGF 2008»
13 years 5 months ago
Visualizing Underwater Ocean Optics
Simulating the in-water ocean light field is a daunting task. Ocean waters are one of the richest participating media, where light interacts not only with water molecules, but wit...
Diego Gutierrez, Francisco J. Serón, Adolfo...
AUTOMATICA
2000
94views more  AUTOMATICA 2000»
13 years 5 months ago
Mutually nonblocking supervisory control of discrete event systems
For discrete event systems, modular supervisory control refers to modular design of a supervisor when multiple control specifications are given. This problem has been studied for ...
M. Fabian, R. Kumar