Sciweavers

12194 search results - page 51 / 2439
» cans 2010
Sort
View
89
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
15 years 2 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
115
Voted
ENTCS
2007
91views more  ENTCS 2007»
15 years 16 days ago
Timed Concurrent Constraint Programming for Analysing Biological Systems
In this paper we present our rst approach to model and verify biological systems using ntcc, a concurrent constraint process calculus. We argue that the partial information const...
Julian Gutierrez, Jorge A. Pérez, Camilo Ru...
116
Voted

Publication
307views
15 years 6 months ago
Scale and Rotation Invariant Detection of Singular Patterns in Vector Flow Fields
We present a method for detecting and describing features in vector flow fields. Our method models flow fields locally using a linear combination of complex monomials. These monomi...
Wei Liu, Eraldo Ribeiro
ALT
2010
Springer
15 years 2 months ago
A Lower Bound for Learning Distributions Generated by Probabilistic Automata
Known algorithms for learning PDFA can only be shown to run in time polynomial in the so-called distinguishability
Borja Balle, Jorge Castro, Ricard Gavaldà
90
Voted
NETWORKS
2010
14 years 11 months ago
Mixed search number and linear-width of interval and split graphs
We show that the mixed search number and the linear-width of interval graphs and of split graphs can be computed in linear time and in polynomial time, respectively.
Fedor V. Fomin, Pinar Heggernes, Rodica Mihai