Sciweavers

1242 search results - page 178 / 249
» The Theory of Grammar Constraints
Sort
View
111
Voted
CCR
2010
203views more  CCR 2010»
15 years 25 days ago
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
We present a sophisticated framework to systematically explore the temporal correlation in environmental monitoring wireless sensor networks. The presented framework optimizes los...
Yao Liang, Wei Peng
CAGD
2008
143views more  CAGD 2008»
15 years 24 days ago
A genus oblivious approach to cross parameterization
In this paper we present a robust approach to construct a map between two triangulated meshes, M and M' of arbitrary and possibly unequal genus. We introduce a novel initial ...
Janine Bennett, Valerio Pascucci, Kenneth I. Joy
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 24 days ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 24 days ago
Implementing general belief function framework with a practical codification for low complexity
In this chapter, we propose a new practical codification of the elements of the Venn diagram in order to easily manipulate the focal elements. In order to reduce the complexity, t...
Arnaud Martin
JAR
2008
89views more  JAR 2008»
15 years 21 days ago
An Extensible Encoding of Object-oriented Data Models in hol
Abstract We present an extensible encoding of object-oriented data models into higherorder logic (HOL). Our encoding is supported by a datatype package that leverages the use of th...
Achim D. Brucker, Burkhart Wolff