Sciweavers

644 search results - page 12 / 129
» A topological characterization of weakness
Sort
View
70
Voted
EUSFLAT
2009
118views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Fuzzy Implications and the Weak Law of Importation
Some open problems on fuzzy implications dealing with the so-called importation law are studied and totally or partially solved in this work. In particular, it is proved that such ...
Sebastià Massanet, Joan Torrens
PDIS
1996
IEEE
15 years 1 months ago
Querying the World Wide Web
The World Wide Web is a large, heterogeneous, distributedcollectionof documents connected by hypertext links. The most common technologycurrently used for searching the Web depend...
Alberto O. Mendelzon, George A. Mihaila, Tova Milo
CGF
1999
130views more  CGF 1999»
14 years 9 months ago
A Free Form Feature Taxonomy
In this paper the notion of free form feature for aesthetic design is presented. The design of industrial products constituted by free form surfaces is done by using CAD systems r...
M. Fontana, Franca Giannini, M. Meirana
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 1 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
FOSSACS
2007
Springer
15 years 3 months ago
Logical Characterizations of Bisimulations for Discrete Probabilistic Systems
We give logical characterizations of bisimulation relations for the probabilistic automata of Segala in terms of three Hennessy-Milner style logics. The three logics characterize s...
Augusto Parma, Roberto Segala