Sciweavers

1730 search results - page 192 / 346
» Algebra and Computation
Sort
View
COLCOM
2009
IEEE
15 years 8 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
ACMMPC
2000
Springer
238views Mathematics» more  ACMMPC 2000»
15 years 8 months ago
Ordered Sets and Complete Lattices
Abstract. These notes deal with an interconnecting web of mathematical techniques all of which deserve a place in the armoury of the welleducated computer scientist. The objective ...
Hilary A. Priestley
CONCUR
1997
Springer
15 years 8 months ago
Bounded Stacks, Bags and Queues
We prove that a bounded stack can be specified in process algebra with just the operators alternative and sequential composition and iteration. The bounded bag cannot be specified ...
Jos C. M. Baeten, Jan A. Bergstra
ECCV
1992
Springer
15 years 8 months ago
Constraints for Recognizing and Locating Curved 3D Objects from Monocular Image Features
Abstract. This paper presents viewpoint-dependent constraints that relate image features such as t-junctions and inflections to the pose of curved 3D objects. These constraints can...
David J. Kriegman, B. Vijayakumar, Jean Ponce
CONCUR
2006
Springer
15 years 7 months ago
On Finite Alphabets and Infinite Bases III: Simulation
This paper studies the (in)equational theory of simulation preorder and equivalence over the process algebra BCCSP. We prove that in the presence of a finite alphabet with at least...
Taolue Chen, Wan Fokkink