Sciweavers

1217 search results - page 134 / 244
» Real Representations
Sort
View
CCS
2006
ACM
15 years 8 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
ECML
2006
Springer
15 years 8 months ago
Efficient Prediction-Based Validation for Document Clustering
Recently, stability-based techniques have emerged as a very promising solution to the problem of cluster validation. An inherent drawback of these approaches is the computational c...
Derek Greene, Padraig Cunningham
CGI
2003
IEEE
15 years 8 months ago
Reaching Volumes Generated by Means of Octal Trees and Cartesian Constraints
This paper presents a system to analyze the reachability of the human body. The inverse kinematics technique is employed to find which regions of space are reachable using a certa...
I. Rodríguez, Manuel Peinado, Ronan Boulic,...
ICDAR
1995
IEEE
15 years 8 months ago
Handwritten word recognition for real-time applications
—A fast method of handwritten word recognition suitable for real time applications is presented in this paper. Preprocessing, segmentation and feature extraction are implemented ...
Gyeonghwan Kim, Venu Govindaraju
AAAI
2008
15 years 6 months ago
Minimal Contraction of Preference Relations
Changing preferences is very common in real life. The expressive power of the operations of preference change introduced so far in the literature is limited to adding new informat...
Denis Mindolin, Jan Chomicki