Sciweavers

154 search results - page 14 / 31
» Comparison of Process Algebra Equivalences Using Formats
Sort
View
CSFW
1996
IEEE
15 years 1 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
VLDB
1990
ACM
77views Database» more  VLDB 1990»
15 years 1 months ago
Efficient Main Memory Data Management Using the DBGraph Storage Model
Therequirementsfor amain memorydatastoragemodel are both compactnessand efficient processing for all database operations. The DBGraph storage model, proposed in this paper, achiev...
Philippe Pucheral, Jean-Marc Thévenin, Patr...
IJCV
2011
163views more  IJCV 2011»
14 years 1 months ago
Operator Splittings, Bregman Methods and Frame Shrinkage in Image Processing
We examine the underlying structure of popular algorithms for variational methods used in image processing. We focus here on operator splittings and Bregman methods based on a uniï...
Simon Setzer
IR
2002
14 years 9 months ago
Hierarchical Text Categorization Using Neural Networks
This paper presents the design and evaluation of a text categorization method based on the Hierarchical Mixture of Experts model. This model uses a divide and conquer principle to ...
Miguel E. Ruiz, Padmini Srinivasan
JCB
2006
144views more  JCB 2006»
14 years 9 months ago
Modeling Virus Self-Assembly Pathways: Avoiding Dynamics Using Geometric Constraint Decomposition
We develop a model for elucidating the assembly pathways by which an icosahedral viral shell forms from 60 identical constituent protein monomers. This poorly understood process a...
Meera Sitharam, Mavis Agbandje-Mckenna