Sciweavers

1037 search results - page 149 / 208
» A view of canonical extension
Sort
View
IANDC
2007
151views more  IANDC 2007»
14 years 11 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
IIE
2007
85views more  IIE 2007»
14 years 11 months ago
Technology in Finnish Special Education - Toward Inclusion and Harmonized School Days
The increasing number of children who need special education in Finland also requires an increasing amount of resources from teachers and a restructuring of the education system. T...
Eija Kärnä-Lin, Kaisa Pihlainen-Bednarik...
SIGPRO
2008
90views more  SIGPRO 2008»
14 years 11 months ago
Some aspects of DOA estimation using a network of blind sensors
Recently, the DOA (Direction Of Arrival) estimation of an acoustic wavefront has been considered in a setting where the inference task is performed by a Wireless Sensor Network (W...
Marco Guerriero, Stefano Maranò, Vincenzo M...
TCS
2008
14 years 11 months ago
Extending FeatherTrait Java with Interfaces
In the context of Featherweight Java by Igarashi, Pierce, and Wadler, and its recent extension FeatherTrait Java (FTJ) by the authors, we investigate classes that can be extended ...
Luigi Liquori, Arnaud Spiwack
TCSV
2008
202views more  TCSV 2008»
14 years 11 months ago
Probabilistic Object Tracking With Dynamic Attributed Relational Feature Graph
Object tracking is one of the fundamental problems in computer vision and has received considerable attention in the past two decades. The success of a tracking algorithm relies on...
Feng Tang, Hai Tao