Sciweavers

1405 search results - page 25 / 281
» We Are No Longer A Priesthood
Sort
View
79
Voted
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
14 years 11 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
UAI
2008
14 years 11 months ago
Almost Optimal Intervention Sets for Causal Discovery
We conjecture that the worst case number of experiments necessary and sufficient to discover a causal graph uniquely given its observational Markov equivalence class can be specif...
Frederick Eberhardt
WOA
2001
14 years 10 months ago
From Design to Intention: Signs of a Revolution
In this paper, we identify and analyze a set of issues that are more and more influencing the characteristics of today's complex software systems, and that distinguish them f...
Franco Zambonelli
IVC
2008
142views more  IVC 2008»
14 years 9 months ago
3D-spline reconstruction using shape from shading: Spline from shading
In this work, we propose an original method of resolution of the shape from shading problem, which is accurate and converges with a few iterations. It relies on two simple ideas. ...
Frédéric Courteille, Alain Crouzil, ...
ENTCS
2007
108views more  ENTCS 2007»
14 years 9 months ago
Remarks on Testing Probabilistic Processes
We develop a general testing scenario for probabilistic processes, giving rise to two theories: probabilistic may testing and probabilistic must testing. These are applied to a si...
Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy,...