Sciweavers

1257 search results - page 89 / 252
» A generalization of Euler's constant
Sort
View
CSL
2004
Springer
14 years 2 months ago
Complete Lax Logical Relations for Cryptographic Lambda-Calculi
Abstract. Security properties are profitably expressed using notions of contextual equivalence, and logical relations are a powerful proof technique to establish contextual equiva...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
ECAI
2004
Springer
14 years 2 months ago
When Are Behaviour Networks Well-Behaved?
Agents operating in the real world have to deal with a constantly changing and only partially predictable environment and are nevertheless expected to choose reasonable actions qui...
Bernhard Nebel, Yuliya Babovich-Lierler
SRDS
2003
IEEE
14 years 2 months ago
Distributed Programming for Dummies: A Shifting Transformation Technique
The perfectly synchronized round model provides the abstraction of crash-stop failures with atomic message delivery. This abstraction makes distributed programming very easy. We p...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
COMPGEOM
2003
ACM
14 years 2 months ago
the asteroid surveying problem and other puzzles
We consider two variants of the well-known “sailor in the fog” puzzle. The first version (the “asteroid surveying” problem) is set in three dimensions and asks for the sh...
Timothy M. Chan, Alexander Golynski, Alejandro L&o...
ICPR
2010
IEEE
14 years 1 months ago
Object Tracking by Structure Tensor Analysis
Covariance matrices have recently been a popular choice for versatile tasks like recognition and tracking due to their powerful properties as local descriptor and their low comput...
Michael Donoser, Stefan Kluckner, Horst Bischof