Sciweavers

5344 search results - page 279 / 1069
» Privacy-Preserving Set Operations
Sort
View
148
Voted
DSONLINE
2008
152views more  DSONLINE 2008»
15 years 4 months ago
Software Architecture Patterns for a Context-Processing Middleware Framework
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Romain Rouvoy, Denis Conan, Lionel Seinturier
CORR
2006
Springer
86views Education» more  CORR 2006»
15 years 4 months ago
Semantic results for ontic and epistemic change
We present an epistemic logic incorporating dynamic operators to describe information changing events. Such events include epistemic changes, where agents become more informed abo...
Hans P. van Ditmarsch, Barteld P. Kooi
ENTCS
2006
124views more  ENTCS 2006»
15 years 4 months ago
Formal Conformance Testing of Systems with Refused Inputs and Forbidden Actions
The article introduces an extension of the well-known conformance relation ioco on labeled transition systems (LTS) with refused inputs and forbidden actions. This extension helps...
Igor B. Bourdonov, Alexander Kossatchev, Victor V....
JCRD
2006
71views more  JCRD 2006»
15 years 4 months ago
Feature Preserving Mesh Simplification Based on Corner Cutting
Abstract Most of the existing algorithms for simplifying triangular meshes might lose some important shape features of the original model, especially at low levels of the simplifie...
Zhongping Ji, Ligang Liu, Guojin Wang
FUIN
2007
100views more  FUIN 2007»
15 years 4 months ago
Interpreted Nets
The nets considered here are an extension of Petri nets in two aspects. In the semantical aspect, there is no one firing rule common to all transitions, but every transition is tr...
Ludwik Czaja