Sciweavers

5378 search results - page 780 / 1076
» Base Logics in Argumentation
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 10 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
123
Voted
CORR
2011
Springer
185views Education» more  CORR 2011»
14 years 7 months ago
Sound and Complete Query Answering in Intensional P2P Data Integration
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Zoran Majkic
156
Voted
LPAR
2012
Springer
13 years 8 months ago
The TPTP Typed First-Order Form with Arithmetic
Abstract. The TPTP World is a well established infrastructure supporting research, development, and deployment of Automated Theorem Proving systems. Recently, the TPTP World has be...
Geoff Sutcliffe, Stephan Schulz, Koen Claessen, Pe...
102
Voted
CVPR
2005
IEEE
16 years 2 months ago
2D Statistical Models of Facial Expressions for Realistic 3D Avatar Animation
We address the issue of modelling facial expressions for realistic 3D avatar animation. We introduce a hierarchical decomposition of a human face into different components and mod...
Lukasz Zalewski, Shaogang Gong
GIS
2004
ACM
16 years 1 months ago
Capturing complex multidimensional data in location-based data warehouses
Motivated by the increasing need to handle complex multidimensional data in location-based data warehouses, this paper proposes a powerful data model that is able to capture the c...
Igor Timko, Torben Bach Pedersen