Sciweavers

12399 search results - page 2295 / 2480
» Deformable structural models
Sort
View
JCP
2006
120views more  JCP 2006»
15 years 4 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
DKE
2007
75views more  DKE 2007»
15 years 4 months ago
Weaving temporal and reliability aspects into a schema tapestry
In aspect-oriented programming (AOP) a cross-cutting concern is implemented in an aspect. An aspect weaver blends code from the aspect into a program’s code at programmer-specifi...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
ENGL
2007
78views more  ENGL 2007»
15 years 4 months ago
A Theorem on the Manipulability of Redundant Serial Kinematic Chains
—The concept of ‘manipulability’ is particularly important to characterize the ability of a serial kinematic chain – artificial manipulator or natural limb – to move quic...
Bertrand Tondu
ENTCS
2007
104views more  ENTCS 2007»
15 years 4 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...
JUCS
2006
133views more  JUCS 2006»
15 years 4 months ago
The Transformation of the Web: How Emerging Communities Shape the Information we Consume
: To date, one of the main aims of the World Wide Web has been to provide users with information. In addition to private homepages, large professional information providers, includ...
Josef Kolbitsch, Hermann A. Maurer
« Prev « First page 2295 / 2480 Last » Next »