Sciweavers

6274 search results - page 921 / 1255
» Proofs, Programs, Processes
Sort
View
142
Voted
VVS
1998
IEEE
97views Visualization» more  VVS 1998»
15 years 7 months ago
Volume Animation Using the Skeleton Tree
In this paper, we describe a technique to animate volumes using a volumetric skeleton. The skeleton is computed from the actual volume, based on a reversible thinning procedure us...
Nikhil Gagvani, Deepak R. Kenchammana-Hosekote, De...
139
Voted
CCS
1998
ACM
15 years 7 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
FOSSACS
1998
Springer
15 years 7 months ago
Generalizing Domain Theory
Abstract. Domain theory began in an attempt to provide mathematical models for high-level programming languages, an area where it has proved to be particularly useful. It is perhap...
Michael W. Mislove
ECBS
1997
IEEE
103views Hardware» more  ECBS 1997»
15 years 7 months ago
The Advanced Battlefield Architecture for Tactical Information Selection (ABATIS)
Modern warfare requires the understanding and management of increasingly complex assemblages of resources. The Advanced Battlefield Architecture for TacticalInformation Selection ...
J. S. Keane, Jerzy W. Rozenblit, Michael Barnes
155
Voted
MAS
1998
Springer
153views Communications» more  MAS 1998»
15 years 7 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...