Sciweavers

1101 search results - page 170 / 221
» Forcing in proof theory
Sort
View
MLQ
2000
99views more  MLQ 2000»
15 years 10 days ago
Von Rimscha's Transitivity Conditions
In Zermelo-Fraenkel set theory with the axiom of choice every set has the same cardinal number as some ordinal. Von Rimscha has weakened this condition to "Every set has the s...
Paul E. Howard, Jean E. Rubin, Adrienne Stanley
114
Voted
ICCV
1999
IEEE
16 years 2 months ago
Capturing Articulated Human Hand Motion: A Divide-and-Conquer Approach
The use of human hand as a natural interface device serves as a motivating force for research in the modeling, analyzing and capturing of the motion of articulated hand. Model-bas...
Ying Wu, Thomas S. Huang
141
Voted
CSFW
1999
IEEE
15 years 4 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
108
Voted
BMCBI
2010
110views more  BMCBI 2010»
15 years 20 days ago
GenHtr: a tool for comparative assessment of genetic heterogeneity in microbial genomes generated by massive short-read sequenci
Background: Microevolution is the study of short-term changes of alleles within a population and their effects on the phenotype of organisms. The result of the below-species-level...
GongXin Yu
CN
2008
128views more  CN 2008»
15 years 19 days ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford