Sciweavers

1174 search results - page 169 / 235
» A Logical Approach to Abstract Algebra
Sort
View
128
Voted
APN
2008
Springer
15 years 2 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
88
Voted
ESANN
2003
15 years 1 months ago
Locally Linear Embedding versus Isotop
Abstract. Recently, a new method intended to realize conformal mappings has been published. Called Locally Linear Embedding (LLE), this method can map high-dimensional data lying o...
John Aldo Lee, Cédric Archambeau, Michel Ve...
CORR
2008
Springer
136views Education» more  CORR 2008»
15 years 19 days ago
Matrix Graph Grammars
Graph transformation is concerned with the manipulation of graphs by means of rules. Graph grammars have been traditionally studied using techniques from category theory. In previ...
Pedro Pablo Pérez Velasco
103
Voted
CORR
2010
Springer
165views Education» more  CORR 2010»
15 years 19 days ago
Detecting Ontological Conflicts in Protocols between Semantic Web Services
Abstract. The task of verifying the compatibility between interacting web services has traditionally been limited to checking the compatibility of the interaction protocol in terms...
Priyankar Ghosh, Pallab Dasgupta
109
Voted
CORR
2008
Springer
129views Education» more  CORR 2008»
15 years 19 days ago
Polynomial Linear Programming with Gaussian Belief Propagation
Abstract--Interior-point methods are state-of-the-art algorithms for solving linear programming (LP) problems with polynomial complexity. Specifically, the Karmarkar algorithm typi...
Danny Bickson, Yoav Tock, Ori Shental, Danny Dolev