Sciweavers

3122 search results - page 40 / 625
» A Theory of Network Equivalence
Sort
View
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
ACL
1993
14 years 11 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka
IDA
2010
Springer
14 years 8 months ago
Three alternative combinatorial formulations of the theory of evidence
In this paper we introduce three alternative combinatorial formulations of the theory of evidence (ToE), by proving that both plausibility and commonality functions share the stru...
Fabio Cuzzolin
TSP
2010
14 years 4 months ago
Algebraic signal processing theory: sampling for infinite and finite 1-D space
We derive a signal processing framework, called space signal processing, that parallels time signal processing. As such, it comes in four versions (continuous/discrete, infinite/fi...
Jelena Kovacevic, Markus Püschel

Lecture Notes
1351views
16 years 8 months ago
The Fundamental Theorem of Asset Pricing
"These lecture notes treat various versions of the so-called “fundamental theorem of asset pricing”. Many students are familiar with statements about models for financia...
Harry van Zanten