Sciweavers

1299 search results - page 178 / 260
» Computing Minimal Diagnoses with Critical Set Algorithms
Sort
View
DLOG
2010
14 years 7 months ago
Correcting Access Restrictions to a Consequence
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on co...
Martin Knechtel, Rafael Peñaloza
DAM
2010
105views more  DAM 2010»
14 years 7 months ago
An iterative approach to graph irregularity strength
An assignment of positive integer weights to the edges of a simple graph G is called irregular if the weighted degrees of the vertices are all different. The irregularity strength,...
Michael Ferrara, Ronald J. Gould, Michal Karonski,...
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 4 months ago
Aorta Segmentation for Stent Simulation
Simulation of arterial stenting procedures prior to intervention allows for appropriate device selection as well as highlights potential complications. To this end, we present a fr...
Jan Egger, Bernd Freisleben, Randolph Setser, Rahu...
VIS
2007
IEEE
239views Visualization» more  VIS 2007»
15 years 11 months ago
Moment Invariants for the Analysis of 2D Flow Fields
We present a novel approach for analyzing two-dimensional (2D) flow field data based on the idea of invariant moments. Moment invariants have traditionally been used in computer vi...
Michael Schlemmer, Manuel Heringer, Florian Morr...
IEEEPACT
2006
IEEE
15 years 3 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...