Sciweavers

1174 search results - page 169 / 235
» A Logical Approach to Abstract Algebra
Sort
View
APN
2008
Springer
14 years 11 hour ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
ESANN
2003
13 years 11 months ago
Locally Linear Embedding versus Isotop
Abstract. Recently, a new method intended to realize conformal mappings has been published. Called Locally Linear Embedding (LLE), this method can map high-dimensional data lying o...
John Aldo Lee, Cédric Archambeau, Michel Ve...
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 10 months ago
Matrix Graph Grammars
Graph transformation is concerned with the manipulation of graphs by means of rules. Graph grammars have been traditionally studied using techniques from category theory. In previ...
Pedro Pablo Pérez Velasco
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 10 months ago
Detecting Ontological Conflicts in Protocols between Semantic Web Services
Abstract. The task of verifying the compatibility between interacting web services has traditionally been limited to checking the compatibility of the interaction protocol in terms...
Priyankar Ghosh, Pallab Dasgupta
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Polynomial Linear Programming with Gaussian Belief Propagation
Abstract--Interior-point methods are state-of-the-art algorithms for solving linear programming (LP) problems with polynomial complexity. Specifically, the Karmarkar algorithm typi...
Danny Bickson, Yoav Tock, Ori Shental, Danny Dolev