Sciweavers

43264 search results - page 8302 / 8653
» Comparing models of computation
Sort
View
TDSC
2008
152views more  TDSC 2008»
15 years 3 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
TEC
2008
139views more  TEC 2008»
15 years 3 months ago
Genetic Programming Approaches for Solving Elliptic Partial Differential Equations
In this paper, we propose a technique based on genetic programming (GP) for meshfree solution of elliptic partial differential equations. We employ the least-squares collocation pr...
Andras Sobester, Prasanth B. Nair, Andy J. Keane
129
Voted
TIP
2008
90views more  TIP 2008»
15 years 3 months ago
Synthetic Aperture Hitchhiker Imaging
We introduce a novel synthetic-aperture imaging method for radar systems that rely on sources of opportunity. We consider receivers that fly along arbitrary, but known, flight traj...
Can Evren Yarman, Birsen Yazici
IVC
2007
266views more  IVC 2007»
15 years 3 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
JACM
2007
85views more  JACM 2007»
15 years 3 months ago
The rational numbers as an abstract data type
onal Numbers as an Abstract Data Type1 J A Bergstra2 University of Amsterdam, Informatics Institute, Kruislaan 403, 1098 SJ Amsterdam, The Netherlands J V Tucker3 Department of Com...
Jan A. Bergstra, J. V. Tucker
« Prev « First page 8302 / 8653 Last » Next »