Sciweavers

239 search results - page 35 / 48
» Reusing Model Transformations While Preserving Properties
Sort
View
CSMR
2007
IEEE
15 years 6 months ago
Consistently Incorporating Changes to Evolve Transition-based Systems
Evolving software-intensive systems from one consistent state to another is a challenging activity due to the intricate inter-dependencies among the components. In this paper, we ...
Mahadevan Subramaniam, Harvey P. Siy
CCCG
2003
15 years 1 months ago
On Coherent Rotation Angles for As-Rigid-As-Possible Shape Interpolation
Morphing algorithms aim to construct visually pleasing interpolations (morphs) between 2D or 3D shapes. One of the desirable properties of a morph is avoiding selfintersections of...
Jaeil Choi, Andrzej Szymczak
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
SLP
1993
110views more  SLP 1993»
15 years 1 months ago
Logic Program Specialisation With Deletion of Useless Clauses
In this paper we describe a method of programspecialisation and give an extended example of its application to specialisation of a refutation proof procedure for rst order logic. ...
D. Andre de Waal, John P. Gallagher
ICCV
2011
IEEE
13 years 11 months ago
Perturb-and-MAP Random Fields: Using Discrete Optimization\\to Learn and Sample from Energy Models
We propose a novel way to induce a random field from an energy function on discrete labels. It amounts to locally injecting noise to the energy potentials, followed by finding t...
George Papandreou, Alan L. Yuille