Sciweavers

2272 search results - page 332 / 455
» Capture Complexity by Partition
Sort
View
118
Voted
ESOP
2005
Springer
15 years 8 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
GD
2005
Springer
15 years 8 months ago
C-Planarity of Extrovert Clustered Graphs
A clustered graph has its vertices grouped into clusters in a hierarchical way via subset inclusion, thereby imposing a tree structure on the clustering relationship. The c-planari...
Michael T. Goodrich, George S. Lueker, Jonathan Z....
HIPEAC
2005
Springer
15 years 8 months ago
Induction Variable Analysis with Delayed Abstractions
ions Sebastian Pop 1 , Albert Cohen 2 , and Georges-Andr´e Silber 1 1 CRI, Mines Paris, Fontainebleau, France 2 ALCHEMY group, INRIA Futurs, Orsay, France Abstract. This paper pre...
Sebastian Pop, Albert Cohen, Georges-André ...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 8 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
RT
2005
Springer
15 years 8 months ago
Bidirectional Importance Sampling for Direct Illumination
Image-based representations for illumination can capture complex real-world lighting that is difficult to represent in other forms. Current importance sampling strategies for ima...
David Burke, Abhijeet Ghosh, Wolfgang Heidrich