Sciweavers

3053 search results - page 414 / 611
» Structured Objects: Modeling and Reasoning
Sort
View
127
Voted
ASWEC
2006
IEEE
15 years 9 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
135
Voted
MVA
2007
165views Computer Vision» more  MVA 2007»
15 years 5 months ago
Self-Calibration for Metric 3D Reconstruction Using Homography
In this paper, our goal is to reconstruct metric 3D models for large structures (or other 3D objects) from uncalibrated images. The internal camera parameters are estimated by usi...
Cheng-Yuan Tang, Yi-Leh Wu, Pei-Ching Hu, Hsien-Ch...
168
Voted
TCOS
2008
15 years 3 months ago
On Contemporary Denotational Mathematics for Computational Intelligence
Denotational mathematics is a category of expressive mathematical structures that deals with high-level mathematical entities beyond numbers and sets, such as abstract objects, com...
Yingxu Wang
CONCURRENCY
1998
119views more  CONCURRENCY 1998»
15 years 3 months ago
C to Java: Converting Pointers into References
We consider the problem of converting C pointers to the less flexible concept of references. Our main application is converting scientific applications from C to Java. We provid...
Erik D. Demaine
141
Voted
VLDB
1992
ACM
151views Database» more  VLDB 1992»
15 years 7 months ago
A Uniform Approach to Processing Temporal Queries
Research in temporal databases has mainly focused on defining temporal data models by extending existing models, and developing access structures for temporal data. Little has bee...
Umeshwar Dayal, Gene T. J. Wuu