Sciweavers

4397 search results - page 246 / 880
» Relational Algebra Operations
Sort
View
CW
2002
IEEE
15 years 9 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
CONCUR
2006
Springer
15 years 6 months ago
Model Checking Quantified Computation Tree Logic
Propositional temporal logic is not suitable for expressing properties on the evolution of dynamically allocated entities over time. In particular, it is not possible to trace such...
Arend Rensink
DAGSTUHL
2006
15 years 5 months ago
MathBrush: An Experimental Pen-Based Math System
It is widely believed that mathematics will be one of the major applications for Tablet PCs and other pen-based devices. In this paper we discuss many of the issues that make doin...
George Labahn, Scott MacLean, Mirette S. Marzouk, ...
CISST
2003
83views Hardware» more  CISST 2003»
15 years 5 months ago
Computational Efficiency of Structural Image Matching
This paper addresses computational efficiency issues of a new algebraic method for imagery registration/conflation. An algebraic approach to conflation/registration of images does ...
Richard Chase, Boris Kovalerchuk
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
15 years 11 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...