Sciweavers

4424 search results - page 820 / 885
» Semantic virtual environments
Sort
View
LICS
1999
IEEE
15 years 4 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
FM
1999
Springer
161views Formal Methods» more  FM 1999»
15 years 4 months ago
Combining Theorem Proving and Continuous Models in Synchronous Design
Support for system speci cation in terms of modelling and simulation environments has become a common practice in safety-critical applications. Also, a current trend is the automat...
Simin Nadjm-Tehrani, Ove Åkerlund
ISD
1999
Springer
213views Database» more  ISD 1999»
15 years 4 months ago
A Probabilistic Approach to Environmental Change Detection with Area-Class Map Data
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...
UIST
1998
ACM
15 years 4 months ago
Constant Density Visualizations of Non-Uniform Distributions of Data
The cartographic Principle of Constant Information Density suggests that the amount of information in an interactive visualization should remain constant as the user pans and zoom...
Allison Woodruff, James A. Landay, Michael Stonebr...
FTRTFT
1998
Springer
15 years 4 months ago
A Modular Visual Model for Hybrid Systems
Visual description techniques are particularly important for the design of hybrid systems because specifications of such systems must usually be discussed between engineers from a ...
Radu Grosu, Thomas Stauner, Manfred Broy