Sciweavers

12981 search results - page 2313 / 2597
» Model Checking (Abstract)
Sort
View
131
Voted
PADL
2001
Springer
15 years 8 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
SAGA
2001
Springer
15 years 8 months ago
Evolutionary Search for Smooth Maps in Motor Control Unit Calibration
We study the combinatorial optimization task of choosing the smoothest map from a given family of maps, which is motivated from motor control unit calibration. The problem is of a ...
Jan Poland, Kosmas Knödler, Alexander Mittere...
SCALESPACE
2001
Springer
15 years 8 months ago
Down-Scaling for Better Transform Compression
Abstract. The most popular lossy image compression method used on the Internet is the JPEG standard. JPEG’s good compression performance and low computational and memory complexi...
Alfred M. Bruckstein, Michael Elad, Ron Kimmel
SEMWEB
2001
Springer
15 years 8 months ago
Utilizing Host-Formalisms to Extend RDF-Semantics
Abstract. RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to r...
Wolfram Conen, Reinhold Klapsing
TACAS
2001
Springer
119views Algorithms» more  TACAS 2001»
15 years 8 months ago
Compositional Message Sequence Charts
Abstract. A message sequence chart (MSC) is a standard notation for describing the interaction between communicating objects. It is popular among the designers of communication pro...
Elsa L. Gunter, Anca Muscholl, Doron Peled
« Prev « First page 2313 / 2597 Last » Next »