Sciweavers

1805 search results - page 122 / 361
» A Theory of Closure Operators
Sort
View
IANDC
2010
125views more  IANDC 2010»
15 years 1 months ago
A thread calculus with molecular dynamics
In a previous paper, we developed an algebraic theory of threads, interleaving of threads, and interaction between threads and services. In the current paper, we extend that theory...
Jan A. Bergstra, C. A. Middelburg
CVPR
2008
IEEE
16 years 6 months ago
Robust null space representation and sampling for view-invariant motion trajectory analysis
In this paper, we propose a novel robust retrieval and classification system for video and motion events based on null space representation. In order to analyze the robustness of ...
Xu Chen, Dan Schonfeld, Ashfaq A. Khokhar
TPHOL
2009
IEEE
15 years 11 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
GECCO
2005
Springer
200views Optimization» more  GECCO 2005»
15 years 10 months ago
An extension of vose's markov chain model for genetic algorithms
The paper presents an extension of Vose’s Markov chain model for genetic algorithm (GA). The model contains not only standard genetic operators such as mutation and crossover bu...
Anna Paszynska
CSFW
2010
IEEE
15 years 8 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin