Sciweavers

3235 search results - page 522 / 647
» Partial Redundant Modeling
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
113
Voted
SAC
2010
ACM
15 years 2 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
BMCBI
2005
96views more  BMCBI 2005»
15 years 1 months ago
Overview of BioCreAtIvE task 1B: normalized gene lists
Background: Our goal in BioCreAtIve has been to assess the state of the art in text mining, with emphasis on applications that reflect real biological applications, e.g., the cura...
Lynette Hirschman, Marc E. Colosimo, Alexander A. ...
TOG
2002
109views more  TOG 2002»
15 years 1 months ago
Level set surface editing operators
We present a level set framework for implementing editing operators for surfaces. Level set models are deformable implicit surfaces where the deformation of the surface is control...
Ken Museth, David E. Breen, Ross T. Whitaker, Alan...
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
15 years 10 days ago
Rao-Blackwellized particle filtering for probing-based 6-DOF localization in robotic assembly
This paper presents a probing-based method for probabilistic localization in automated robotic assembly. We consider peg-in-hole problems in which a needle-like peg has a single p...
Yuichi Taguchi, Tim K. Marks, Haruhisa Okuda