Sciweavers

510 search results - page 101 / 102
» An Algebraic Framework for Urgency
Sort
View
ENTCS
2006
134views more  ENTCS 2006»
14 years 11 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
108
Voted
JSAC
2006
112views more  JSAC 2006»
14 years 11 months ago
Network Kriging
ABSTRACT. Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide...
David B. Chua, Eric D. Kolaczyk, Mark Crovella
TIP
2008
287views more  TIP 2008»
14 years 11 months ago
3-D Object Recognition Using 2-D Views
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize...
Wenjing Li, George Bebis, Nikolaos G. Bourbakis
JACM
2007
84views more  JACM 2007»
14 years 11 months ago
Polymorphic higher-order recursive path orderings
This paper extends the termination proof techniques based on reduction orderings to a higher-order setting, by defining a family of recursive path orderings for terms of a typed ...
Jean-Pierre Jouannaud, Albert Rubio
CORR
2004
Springer
176views Education» more  CORR 2004»
14 years 11 months ago
The First-Order Theory of Sets with Cardinality Constraints is Decidable
Data structures often use an integer variable to keep track of the number of elements they store. An invariant of such data structure is that the value of the integer variable is ...
Viktor Kuncak, Martin C. Rinard