Sciweavers

2061 search results - page 392 / 413
» Authorization for Metacomputing Applications
Sort
View
AIML
2008
14 years 11 months ago
Valentini's cut-elimination for provability logic resolved
In 1983, Valentini presented a syntactic proof of cut-elimination for a sequent calculus GLSV for the provability logic GL where we have added the subscript V for "Valentini&q...
Rajeev Goré, Revantha Ramanayake
93
Voted
CASCON
2007
1035views Education» more  CASCON 2007»
14 years 11 months ago
An IDE for software development using tabular expressions
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
Dennis K. Peters, Mark Lawford, Baltasar Tranc&oac...
MEDIAFORENSICS
2010
14 years 11 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
SODA
2007
ACM
127views Algorithms» more  SODA 2007»
14 years 11 months ago
Line-of-sight networks
Random geometric graphs have been one of the fundamental models for reasoning about wireless networks: one places n points at random in a region of the plane (typically a square o...
Alan M. Frieze, Jon M. Kleinberg, R. Ravi, Warren ...
88
Voted
AVI
2004
14 years 11 months ago
Stitching: pen gestures that span multiple displays
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Ken Hinckley, Gonzalo Ramos, François Guimb...