Sciweavers

1405 search results - page 25 / 281
» We Are No Longer A Priesthood
Sort
View
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
15 years 2 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
UAI
2008
15 years 1 months ago
Almost Optimal Intervention Sets for Causal Discovery
We conjecture that the worst case number of experiments necessary and sufficient to discover a causal graph uniquely given its observational Markov equivalence class can be specif...
Frederick Eberhardt
76
Voted
WOA
2001
15 years 1 months ago
From Design to Intention: Signs of a Revolution
In this paper, we identify and analyze a set of issues that are more and more influencing the characteristics of today's complex software systems, and that distinguish them f...
Franco Zambonelli
113
Voted
IVC
2008
142views more  IVC 2008»
15 years 15 days ago
3D-spline reconstruction using shape from shading: Spline from shading
In this work, we propose an original method of resolution of the shape from shading problem, which is accurate and converges with a few iterations. It relies on two simple ideas. ...
Frédéric Courteille, Alain Crouzil, ...
ENTCS
2007
108views more  ENTCS 2007»
15 years 14 days ago
Remarks on Testing Probabilistic Processes
We develop a general testing scenario for probabilistic processes, giving rise to two theories: probabilistic may testing and probabilistic must testing. These are applied to a si...
Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy,...