Sciweavers

1414 search results - page 272 / 283
» Combining Intruder Theories
Sort
View
FSS
2006
140views more  FSS 2006»
14 years 9 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre
CCR
2007
107views more  CCR 2007»
14 years 9 months ago
Dynamic load balancing without packet reordering
Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes or link failures. Dynamic load balancing protocols, ho...
Srikanth Kandula, Dina Katabi, Shantanu Sinha, Art...
JLP
2006
138views more  JLP 2006»
14 years 9 months ago
Algebraic-coalgebraic specification in CoCasl
We introduce CoCasl as a light-weight but expressive coalgebraic extension of the algebraic specification language Casl. CoCasl allows the nested combination of algebraic datatype...
Till Mossakowski, Lutz Schröder, Markus Rogge...
MCS
2006
Springer
14 years 9 months ago
A phase-field method for interface-tracking simulation of two-phase flows
For interface-tracking simulation of two-phase flows, we propose a new computational method, NS-PFM, combining Navier-Stokes (NS) equations with phase-field model (PFM). Based on ...
Naoki Takada, Masaki Misawa, Akio Tomiyama
PAMI
2006
145views more  PAMI 2006»
14 years 9 months ago
Reflectance Sharing: Predicting Appearance from a Sparse Set of Images of a Known Shape
Three-dimensional appearance models consisting of spatially varying reflectance functions defined on a known shape can be used in analysis-by-synthesis approaches to a number of vi...
Todd Zickler, Ravi Ramamoorthi, Sebastian Enrique,...